The sheer amount of data produced by modern science research has created a need for the construction and understanding of "data-intensive systems", largescale, distribut...
Chris Mattmann, Daniel J. Crichton, J. Steven Hugh...
Mobile computer technologies are increasingly being appropriated and used to facilitate people’s social life outside the work domain. Addressing this emerging domain of use, we ...
Abstract. CORBA Object Transaction Monitors (OTM) refer to a middleware technology that enable the building of transactional, objectoriented information systems running in distribu...
Thomas Sandholm, Stefan Tai, Dirk Slama, Eamon Wal...
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...