We consider the possibility of having a (recursive) name server act as a slave to the root zone, rather than caching information after it is requested. Tests, described here, indi...
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Background: The SH3 domain family is one of the most representative and widely studied cases of so-called Peptide Recognition Modules (PRM). The polyproline II motif PxxP that gen...
We present a general technique for extending Java-like languages with dynamic overloading, where method selection depends on the dynamic type of the parameter, instead of just the ...
Several Java bindings of the Message Passing Interface standard, MPI, have been developed recently. Message bu ers have usually been restricted to arrays with elements of primitiv...
Bryan Carpenter, Geoffrey Fox, Sung Hoon Ko, Sang ...