With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
—In China, the number of online learners who attend formal education has quadrupled in the last 5 years to 8.2 millions until the end of 2008. How can online teachers build and u...
Xiaohong Tan, Carsten Ullrich, Yan Wang, Ruimin Sh...
Based on the thermodynamic concept of a reservoir, we investigate a computational model for interaction with unresolved degrees of freedom (a thermal bath). We assume that a finite...
—In this paper we propose the method of task merging and idle period clustering for dynamic power management (DPM) in a real-time system with multiple processing elements. We sho...
—In order to simulate biological processes, we use multi-agents system. However, modelling cell behavior in systems biology is complex and may be based on intracellular biochemic...
Vincent Rodin, Gabriel Querrec, Pascal Ballet, Fra...