Modelling architectural information is particularly important because of the acknowledged crucial role of software architecture in raising the level of abstraction during developme...
The World-Wide Web consists not only of informational, but also computational resources. However, these resources, especially computational ones are underutilized. One characteris...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Abstract: Drag-and-pop and drag-and-pick are interaction techniques designed for users of pen- and touchoperated display systems. They provide users with access to screen content t...
Patrick Baudisch, Edward Cutrell, Mary Czerwinski,...
Grid Computing has made substantial advances in the past decade; these are primarily due to the adoption of standardized Grid middleware. However Grid computing has not yet become...
Irfan Habib, Kamran Soomro, Ashiq Anjum, Richard M...