Location-based Services are gaining more and more users and are available on a broad set of mobile devices. Due to their complexity such services are currently only provided by large organizations that use their own p...
详细信息
Recently it became a hot topic to protect VMs from a compromised or even malicious hypervisor. However, most previous systems are vulnerable to rollback attack, since it is hard to distinguish from normal suspend/resu...
详细信息
The increasing amount of resources in a single machine constantly increases the level of server consolidation for virtualization. However, along with the improvement of server efficiency, the dependability of the virt...
详细信息
distributed mobile systems are characterized by asymmetry in both network connectivity and computing power, mobility of hosts and their constraints. To address these issues, existing approaches attempt to completely r...
详细信息
Fixed-priority preemptive scheduling is a popular scheduling scheme for real-time systems. This is accompanied by a vast amount of research on how to analyse and check whether these systems satisfy their real-time req...
详细信息
Vehicular Ad-hoc Networks are a very interesting self-organizing communication system that can make the traffic on our roads much safer. A lot of aspects of the behavior of these systems are studied using network simu...
详细信息
ISBN:
(纸本)9781565553415
Vehicular Ad-hoc Networks are a very interesting self-organizing communication system that can make the traffic on our roads much safer. A lot of aspects of the behavior of these systems are studied using network simulation frameworks. While the upper communication layers of Vehicular Ad-hoc Networks are mainly simulated according to their specifications, in this paper we will highlight weak points in these simulations. They occur due the fact that the layers below the link layer are considered very rarely and are also almost neglected by the commonly used network simulation frameworks. This can potentially lead to inaccurate simulation results which can be fatal when studying safety relevant applications or application with real-time constraints. In this work in progress paper we are going to propose an approach to get this under control.
In this paper we argue in favor of remote data access based on the principle of abstract data types. This paradigm has inherent advantages over the traditional file-oriented approach, especially when used in a ubiquit...
详细信息
Vertical handovers (VHO) are expected to be a key feature in Beyond 3G (B3G) networks. This paper presents a Pastry-based P2P overlay network for supporting vertical handover in B3G networks. The P2P overlay is used t...
详细信息
Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain l...
详细信息
Ontology merging systems enable the reusability and interoperability of existing knowledge. Ideally, they allow their users to specify which characteristics the merged ontology should have. In prior work, we have iden...
详细信息
暂无评论