This paper provides three contributions to the study of functional integration of distributed enterprise systems. First, we describe the challenges associated with functionally in...
Krishnakumar Balasubramanian, Douglas C. Schmidt, ...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...
Conventions are necessary to establish in any recurrent cooperative arrangement. In electronic work, they are important so as to regulate the use of shared objects. Based on empir...
In recent years, new highly scalable storage systems have significantly contributed to the success of Cloud Computing. Systems like Dynamo or Bigtable have underpinned their abil...
Simon Loesing, Martin Hentschel, Tim Kraska, Donal...
The increase in computational power and the networking abilities of home appliances are revolutionizing the way we interact with our homes. This trend is growing stronger and open...