In 21 century, an era of information and internet, it is essential for universities to develop their education in order to be focused. Testing online has unparalleled advantages i...
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Abstract: For cost-effective realization of sizable realtime distributed computing application systems, significant advances in resource allocation are in critical needs. An advanc...
K. H. (Kane) Kim, Yuqing Li, Kee-Wook Rim, Eltefaa...
This paper argues that simply applying a multipletree scheme does not provide sufficient fairness for applications in an Internet-scale distributed system, in terms of performance...
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...