The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
ÐIn this paper, we investigate the k-set consensus problem in asynchronous distributed systems. In this problem, each participating process begins the protocol with an input value...
Roberto De Prisco, Dahlia Malkhi, Michael K. Reite...
We present a texturing method that correctly maps homogeneous non-periodic textures to arbitrary surfaces without any of the difficulties usually encountered using existing tools...
With the advancement of wireless network and mobile computing, there is an increasing need to build a mobile le system that can perform e ciently and correctly for accessing onlin...
In this work, we develop a partial evaluation technique for residuating functional logic programs, which generalize the concurrent computation models for logic programs with delays...