Through the recent emergence of joint resource and network virtualization, dynamic composition and provisioning of time-limited and isolated virtual infrastructures is now possible...
This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surve...
Abstract. Recent work in the field of middleware technology proposes semanticsaware tuplespaces as a tool for coping with the scalability, heterogeneity and dynamism issues arisin...
Abstract. Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as ...
Traditionally, product models often have a rigid nature, both with respect to the manner in which they are initially tailored to clients, and to the way they are maintained over t...
Tibor Bosse, Fiemke Both, Mark Hoogendoorn, Jan Tr...