Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a pub...
Sean C. Rhea, Brighten Godfrey, Brad Karp, John Ku...
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
One of the biggest challenges facing the Internet today is to scale to an infrastructure that can provide quality-of-service (QoS) to a wide variety of applications and traffic typ...
Service-oriented Architecture supports software to be composed from services dynamically. Selecting and composing appropriate services according to business process, policies and n...
Stephan Reiff-Marganiec, HongQing Yu, Marcel Tilly
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty