When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
This paper presents an application distributed simulation to the evaluation of virtual enterprises. Each company or candidate can use a simulation of its facilities to determine i...
Jayendran Venkateswaran, Mohammed Yaseen Kalachika...
In any hierarchical radiosity method, the most expensive part is the evaluation of the visibility. Many methods use sampling and ray casting to determine this term. Space partitio...
In this work we want to put in evidence the necessity to integrate theoretical, methodological and didactical aspects with innovative e-learning systems, in order to hypothesize po...