Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
GRID Application development is a hard task. Good applications should correctly use large distributed systems, whose infrastructure heavily affects the application performance. In ...
One of the typical features of distributed systems is the heterogeneity of its components (e.g. geographical spreading and different platform architectures), leading to interopera...
Tom Verdickt, Bart Dhoedt, Frank Gielen, Piet Deme...
Increase of future appliances at home environment causes confusion with less computer-skilled users. Consequently, embedded-hardware could prevent us from recognizing all of them ...
This short paper is aimed to discuss the challenges for location-based services and proposes our framework, which makes it possible to obtain information from heterogeneous sources...