Abstract--The networked application environment has motivated the development of multitasking operating systems for sensor networks and other low-power electronic devices, but thei...
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
Checkpointing of parallel applications can be used as the core technology to provide process migration. Both, checkpointing and migration, are an important issue for parallel appl...
The significance that ambient intelligence (AmI) has acquired in recent years requires the development of innovative solutions. In this sense, the development of AmI-based systems...
Dante I. Tapia, Ajith Abraham, Juan M. Corchado, R...
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...