Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasing...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Predicting how well applications may run on modern systems is becoming increasingly challenging. It is no longer sufficient to look at number of floating point operations and commu...
To ease the implementation of distributed objectoriented systems we developed the PDC technique (Proxy/ Dispatcher/Collocutor technique), a simple and pragmatic approach to allow ...
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...