To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
The widespread diffusion of mobile computing along with the integration of telecommunication systems and the Internet enables a scenario where the promise of ubiquitous computing ...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
Moving object databases store and process data for objects that change location frequently. Materialized views maintained over time must be updated to reflect changes due to the m...
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...