Abstract. We present a compositional approach to the implementation of hard real-time software running on a distributed platform. We explain how several code suppliers, coordinated...
Thomas A. Henzinger, Christoph M. Kirsch, Slobodan...
The simulated evaluation of memory management policies relies on reference traces—logs of memory operations performed by running processes. No existing approach to reference tra...
This paper explores integrating self-tuning updates and sequential consistency to enable transparent replication of large-scale information dissemination services. We focus our at...
Medium Access Control (MAC) policies in which the scheduling time slots are allocated irrespectively of the underline topology are suitable for ad-hoc networks, where nodes can ent...
This paper reports on the development of an innovative agent-mediated electronic marketplace, which is able to efficiently handle transportation transactions of various types. Soft...
Nikos I. Karacapilidis, Alexis Lazanas, Pavlos Mor...