— The paper presents a software architecture for Distributed Timed Multitasking - a new model of computation that can be used to engineer open, and the same time, predictable emb...
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Elections are increasingly dependent on computers and telecommunication systems. Such “E-voting” schemes create socio-technical systems (combinations of technology and human o...
Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, L...
Memory transactions, similar to database transactions, allow a programmer to focus on the logic of their program and let the system ensure that transactions are atomic and isolate...
Haris Volos, Andres Jaan Tack, Neelam Goyal, Micha...
Performance asymmetry in multicore architectures arises when individual cores have different performance. Building such multicore processors is desirable because many simple cores...
Saisanthosh Balakrishnan, Ravi Rajwar, Michael Upt...