In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
The aim of DICE is the improvement of communication between culture-providers (institutions, museums, etc.) and different categories of users (scholars, publishers, culturaltouris...
Checkpointing virtual machines shows potential for allowing a user to download, install, and initialize a complete software environment by selecting a web page link. Starting with...
When using communication in multi-robot systems it's often not desirable to choose an form of communication that separates the messages from the physical environment in which...
In this study, we consider an environment composed of a heterogeneous cluster of multicore-based machines used to analyze satellite images. The workload involves large data sets, a...
Luis D. Briceo, Jay Smith, Howard Jay Siegel, Anth...