Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However...
Emmanuel Cecchet, George Candea, Anastasia Ailamak...
Over the last twenty years the interfaces for accessing persistent storage within a computer system have remained essentially unchanged. Simply put, seek, read and write have deļ¬...
Xiangyong Ouyang, David W. Nellans, Robert Wipfel,...
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and veriļ¬cation. However, it has also various sho...