Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
Intelligent video surveillance (IVS) offers a large spectrum of different applications that have strict requirements on quality of service (QoS) and energy-efficiency. Recent emb...
— We present a novel distributed algorithm for constructing random overlay networks that are composed of d Hamilton cycles. The protocol is completely decentralized as no globall...
Distributed programming is applicable in a wide range of domains such as control systems. These systems are subject to mutable environments and must also provide a time varying ad...
Luci Pirmez, Luiz F. Rust da Costa Carmo, Reinaldo...
Experiments in High Energy Physics (HEP) generate tremendous amounts of data. For example, the accelerator at CERN is expected to generate petabytes per year. New HEP discoveries ...
Jagadeesh Kasaraneni, Theodore Johnson, Paul Avery