Abstract. We investigate the performance of two approaches for matrix inversion based on Gaussian (LU factorization) and Gauss-Jordan eliminations. The target architecture is a cur...
Peter Benner, Pablo Ezzatti, Enrique S. Quintana-O...
These last years, the evolution of nomadic terminals and mobile networks has yield to the development of the ubiquitous computing. In this context, actual query evaluation and opt...
Organizations increasingly coordinate their product and service development processes to deliver their products and services as fast as possible, and to involve employees, custome...
To deal with the frequent, foreseeable and variable disconnections that occur in a mobile environment, we introduce a exible, two-level consistency model. Semantically related or ...
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...