Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
Abstract. With the advent of Service Oriented Architecture organizations have experienced services as a platform-independent technology to develop and use simple internal applicati...
Devis Bianchini, Cinzia Cappiello, Valeria De Anto...
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy
: Due to technological advances, wireless personal digital assistants (PDAs) are becoming quite popular. However, it seems as if none of the existing applications fully exploits th...
Ralf Salomon, Holger Harms, Frank Reichenbach, Tho...
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...