Environmental information systems (EIS) have been in professional use for quite a long time. Applications of this domain often include features of quite common location based servi...
Ari Keronen, Mauri Myllyaho, Pasi Alatalo, Markku ...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
In data stream applications, data arrive continuously and can only be scanned once as the query processor has very limited memory (relative to the size of the stream) to work with...
Nick Koudas, Beng Chin Ooi, Kian-Lee Tan, Rui Zhan...
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...