abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
This paper discusses some of the typical characteristics of modern Web applications and analyses some of the problems the developers of such systems have to face. One of such type...
Avelino F. Zorzo, Panayiotis Periorellis, Alexande...
Events in self-timed rings can propagate evenly spaced or as bursts. By studying these phenomena, we obtain a better understanding of the underlying dynamics of self-timed pipelin...
Mark R. Greenstreet, Anthony Winstanley, Aurelien ...
This paper describes the architecture and the implementation of Multishelf - a decentralized Peerto-Peer infomediator. Multishelf was designed and built during a ten-week senior s...
Zary Segall, Andrew Fortier, Gerd Kortuem, Jay Sch...
This paper describes how animat-based “food foraging” techniques may be applied to the design of low-level image processing algorithms. First, we show how we implemented the fo...
Enzo Bolis, Christian Zerbi, Pierre Collet, Jean L...