Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...
Compile-time scheduling is one approach to extract parallelism which has proved effective when the execution behavior is predictable. Unfortunately, the performance of most priori...
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
The computer aided diagnosis (CAD) problems of detecting
potentially diseased structures from medical images are
typically distinguished by the following challenging characterist...
Recent advances in wireless technologies have made the mobile computing a reality. In order to provide services of good quality to mobile users and improve the system performance,...