Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Peer-to-peer computing paradigm is emerging as a scalable and robust model for sharing media objects. In this paper, we propose an architecture and describe the associated algorit...
There are many reasons why reverse engineering research tools often fail to be evaluated or adopted in industry. Their rough user interfaces and poor interoperability are just two...
Qin Zhu, Yu Chen, Piotr Kaminski, Anke Weber, Holg...
The web-services stack of standards is designed to support the reuse and interoperation of software components on the web. A critical step, to that end, is service discovery, i.e....
Both the research community and developers in industry have identified the need for a clearly defined vocabulary and programming framework for location technologies. A layered Loc...
David Graumann, Jeffrey Hightower, Walter Lara, Ga...