In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
The emerging Car-to-Car communication (C2C) technology, known as Wireless Access in Vehicular Environments (WAVE), enables vehicles on the roadway to communicate with each other a...
Yunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen,...
Netbill is a business model, set of protocols, and software implementation for commerce in information goods and other network delivered services. It has very low transaction cost...
Due to the widespread availability of accurate localization technologies, navigation systems are more and more present on mobile devices. These applications usually provide facili...
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...