—In this paper, we propose a novel concept of Ubiquitous Virtual Reality (U-VR) and examine technical challenges to be required for realizing it. It is difficult to realize Virtu...
Youngjung Suh, Kiyoung Kim, JoungHyun Han, Woontac...
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
We introduce Wiktionary as an emerging lexical semantic resource that can be used as a substitute for expert-made resources in AI applications. We evaluate Wiktionary on the perva...
Because of its inter-organisational, collaborative use of computational resources, grid computing presents a severe interoperability challenge to grid application developers. Diffe...
Dirk Gorissen, Gunther Stuer, Kurt Vanmechelen, Ja...
Abstract. This paper presents P2P-MPI, a middleware aimed at computational grids. From the programmer point of view, P2P-MPI provides a message-passing programming model which enab...