As part of the Bristol Wearable Computing Initiative we are exploring location sensing systems suitable for use with Wearable Computing. In this paper we present our ndings, and in...
Conventional prefetching schemes regard prediction accuracy as important because useless data prefetched by a faulty prediction may pollute the cache. If prefetching requires cons...
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Purpose – The purpose of this paper is to examine the integration of digital library (DL) technologies with ontology-based knowledge representation in providing semantic rich in...