This paper analyzes an Intel Pentium 4 hyper-threading processor. The focus is to understand its performance and the underlying reasons behind that performance. Particular attenti...
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
The resource lookup requirements in applications such as web caching, web content search, content distribution, resource sharing, network monitoring and management, and e-commerce...
In this paper, we focus our attention on the problem of automating the addition of failsafe fault-tolerance where fault-tolerance is added to an existing (fault-intolerant) progra...
Textures are one of the basic features in visual searching and computational vision. In the literature, most of the attention has been focussed on the texture features with minima...