In large-scale distributed information systems, where participants are autonomous and have special interests for some queries, query allocation is a challenge. Much work in this c...
Abstract. There are endless possibilities for the next generation of mobile social applications that automatically determine your social context. A key element of such applications...
Today several approaches using Situational Method Engineering paradigm exist, each of them proposes methods and techniques for developing ad-hoc design processes. In this context ...
—A variety of wireless network technologies have been developed and deployed, including GSM, UMTS, WiFi and WiMAX. The advantages of having an integrated heterogeneous wireless n...
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...