Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
When implementing an application system in a distributed computing environment, several architectural questions arise such as, how and where computing resources are distributed, a...
The DisCAS system employs and interacts with multiple ELIMINOs distributed over the Internet to achieve a distributed-parallel computing environment. ELIMINO is a computer algebra ...