Abstract. The fact that so many different kinds of coordination models and languages have been proposed suggests that no one single approach will be the best for all coordination p...
Franz Achermann, Stefan Kneubuehl, Oscar Nierstras...
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
In this paper we present a design space exploration flow to achieve energy efficiency for streaming applications on MPSoCs while meeting the specified throughput constraints. The ...
entifies three levels of abstraction for resource requirements a service provider needs to manage, detailed specification of raw resources, virtualization of heterogeneous resource...
Asit Dan, Kavitha Ranganathan, Catalin Dumitrescu,...