Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing...
In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context....
Heterogeneity, mobility, complexity and new application domains raise new software reliability issues that cannot be met cost-effectively only with classic software engineering ap...
Recent progress in ubiquitous computing technology is allowing development of new and sophisticated applications that are now able to store very large data on the mobile device it...
Cristiano Silveira, Leonardo Eloy, Jose Maria Mont...
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...