— Tools such as pathchar, clink, and pchar attempt to measure the capacity of every Layer-3 (L3) hop in a network path. These tools use the same underlying measurement methodolog...
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examp...
Vikram S. Adve, Chris Lattner, Michael Brukman, An...
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the server...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
The growing interest in genomic research has caused an explosive growth in the size of DNA databases making it increasely challenging to perform searches on them. In this paper, w...
Zhenqiang Tan, Xia Cao, Beng Chin Ooi, Anthony K. ...