We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
— Graphical User Interface (GUI) APplications (GAPs) are ubiquitous and provide various services. However, it is difficult to make GAPs exchange information (i.e., interoperate)...
Mark Grechanik, Kevin M. Conroy, Kishore S. Swamin...
The increase of bandwidth and streaming technology has made video on the Web the current “killer-app” of the dot-com world. However, users still face many problems. Users have...
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...