Algorithmic skeletons can be used to write architecture independent programs, shielding application developers from the details of a parallel implementation. In this paper, we pre...
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
We present a new architectural style for synchronous groupware that eases the transition from scenario based modeling to component design, and from component design to distributed ...
This paper provides two contributions to the study of programming languages and middleware for real-time and embedded applications. First, we present the empirical results from ap...
This paper argues that the current OO technology does not support reuse and configurability in an effective way. This problem can be addressed by augmenting OO analysis and design ...