In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
As we enter the era of petascale computing, system architects must plan for machines composed of tens or even hundreds of thousands of processors. Although fully connected network...
Shoaib Kamil, Ali Pinar, Daniel Gunter, Michael Li...
The construction and maintenance of data warehouses (views) in large-scale environments composed of numerous distributed and evolving information sources (ISs) such as the WWW has ...
In this article, we are interested in providing a framework to develop games for visually impaired or blind children. In this context, we propose a tool set to ease the creation o...
Cyrille Bertelle, Antoine Dutot, Sylvain Lerebourg...
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...