The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
Update anywhere-anytime-anyway transactional replication has unstable behavior as the workload scales up. To reduce this problem, a two-tier replication algorithm is proposed in [...
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...