In cyber attack monitoring systems, various types of visualizations, such as geographical visualization, temporal visualization, logical visualization, are being used. Each visual...
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, ...
Makan Pourzandi, Axelle Apvrille, E. Gingras, A. M...
An unpublished algorithm of Haldar and Vidyasankar implements an atomic variable of an arbitrary type T for one writer and one reader by means of 4 unsafe variables of type T , th...
Macro-control is an important system of regulation in the body of socialist market economy; it plays a significant role in the social economy. To make it come into play, it is nec...