Efficient access methods are reviewed and explored in relation to the global surface hourly data set and several of its derivative products. Typical access paradigms are compared ...
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
This paper presents a system for visualizing mobile object frameworks. In such frameworks, the objects can migrate to remote hosts, along with their state and behavior, while the ...
The concept augmented reality is used to describe a system that supplements reality by adding virtual objects into a real-world view. This paper describes a flexible mobile code a...
We present techniques to index mobile objects in order to efficiently answer range queries about their future positions. This problem appears in real-life applications, such as pr...
Dimitris Papadopoulos, George Kollios, Dimitrios G...