Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
: Recent advances in sensor technologies, wireless communication, powerful mobile devices, and wearable computers strongly support novel types of applications. Especially in health...
Ontology as a discipline of Computer Science has made many claims about its usefulness, however to date there has been very little evaluation of those claims. We present the resul...
Christopher A. Welty, Ruchi Mahindru, Jennifer Chu...
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...