Mobile phones are being increasingly equipped with sensors that ease retrieval of context information about a user. Context data can be aggregated with information centrally avail...
Laurent-Walter Goix, Massimo Valla, Laura Cerami, ...
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Failures of all forms happen: from losing single network packets to site-wide disasters. Since businesses rely heavily on their data, it is imperative that failures require minima...
Abstract. Methods for the automatic composition of services into executable workflows need detailed knowledge about the application domain, in particular about the available servic...
Anna-Lena Lamprecht, Stefan Naujokat, Bernhard Ste...
Unstructured peer-to-peer infrastructure has been widely employed to support large-scale distributed applications. Many of these applications, such as locationbased services and m...