Many important parallel applications require multiple flows of control to run on a single processor. In this paper, we present a study of four flow-of-control mechanisms: proces...
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
This panel introduces and explains the "future directions" and "broadening" discussions at the VLDB Endowment. Panelists are Michael Brodie, Stefano Ceri, Umes...
This paper presents our on-going research into selforganizing and self-healing networks of resource brokers, for use in complex Peer-to-Peer (P2P) resource sharing and Grid comput...
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan