In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
We apply the concept of “games with a purpose” to NPcomplete mapping and scheduling problems in distributed systems and report our experiences. The particular context is a sch...
The wearable computer that can understand the context of human life and communicate autonomously with various electronic media in a ubiquitous computing environment would be very ...
Context-aware computing in location-aware environments demands the combination of real world position with a computational world model to infer context. We present a novel approach...
We consider the use of a database cluster for Application Service Provider (ASP). In the ASP context, applications and databases can be update-intensive and must remain autonomous....