Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
It has been theoretically shown that performing coding in networked systems, including Reed-Solomon codes, fountain codes, and random network coding, has a clear advantage with re...
Cooperative Rooms (COR) is an interdisciplinary research and development program of GMD in collaboration with partners. Its objective is to design, develop and investigate future ...
Rolf Reinema, Knut A. Bahr, H.-J. Burkhardt, Marie...
We present a new architectural style for synchronous groupware that eases the transition from scenario based modeling to component design, and from component design to distributed ...