Executing critical systems often rely on humans to make important and sometimes life-critical decisions. As such systems become more complex, the potential for human error to lead...
Lori A. Clarke, Leon J. Osterweil, George S. Avrun...
Background: This paper describes techniques for accelerating the performance of the string set matching problem with particular emphasis on applications in computational proteomic...
Yoginder S. Dandass, Shane C. Burgess, Mark Lawren...
As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transie...
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
This paper describes the adaptive component migration facility in the Bifrost Location-Independent Computing System. We present a facility that allows mobile clients to selectivel...
Avneesh Bhatnagar, Evan Speight, Dan Crawl, Joseph...