The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Distributed systems based on cluster of workstation are more and more difficult to manage due to the increasing number of processors involved, and the complexity of associated appl...
Service-based approaches are widely used to integrate heterogenous systems. Web services allow for the definition of highly dynamic systems where components (services) can be dis...
– This paper describes the system design and implementation of Active Basestations, a novel application of the run-time reconfigurable hardware technology whose applications have...
With the increasing prevalence of mobile devices, computing is being carried out on devices with varied resource constraints and is afflicted by constant changes in run-time conte...
Nalini Moti Belaramani, Cho-Li Wang, Francis C. M....