This paper presents a four-faceted framework for distributed applications that use worldwide networks connecting large numbers of people, software tools, monitoring instruments, a...
K. Mani Chandy, Joseph Kiniry, Adam Rifkin, Daniel...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
The present paper shows how vertical actuation alone may be used to effectively control the spatial distribution of mobile vehicles ("balloons" in air, or "drifters&...
Even though grid research is prosperous in an extensive context, few grid platforms for high performance computing are practical and in operation so far. Since most applications a...
Distributed snapshots are an important building block for distributed systems, and, among other applications, are useful for constructing efficient checkpointing protocols. In ad...