Abstract. Within Self-reconfiguring systems two basic problems arise: on instruction level, reconfigurable instruction sets make program generation and execution inherently difficu...
We introduce an online knowledge base for semantic representation and annotation of a world heritage site in danger. For this purpose we designed ontology inside the protégé tool...
The simulated evaluation of memory management policies relies on reference traces—logs of memory operations performed by running processes. No existing approach to reference tra...
Abstract— The design of ultra-wideband (UWB) communication systems has proven to be challenging. Coherent systems require a rake receiver with many taps that is difficult to tra...
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...