Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
The challenge for the development of next generation software is the successful management of the complex computational environment while delivering to the scientist the full powe...
Jack Dongarra, George Bosilca, Zizhong Chen, Victo...
: Web applications are widely disseminated, but, traditional development methods for this type of application still require a substantial amount of new modeling and programming. Cu...
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Increasing numbers of software developers are using the Unified Modeling Language (UML) and associated visual modeling tools as a basis for the design and implementation of their ...
Jean Hartmann, Claudio Imoberdorf, Michael Meising...