In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Software architecture research focuses on models of software architectures as specified in architecture description languages (ADLs). As research progresses in specific areas of s...
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
As the number of cores inside compute clusters continues to grow, the scalability of MPI (Message Passing Interface) is important to ensure that programs can continue to execute o...
(a) (b) Figure 1: (a) CAM running on an iPhone; (b) Reading a design sketch using Microsoft's TagReader client. In this paper, we report the results of a field trial of a Ubi...
Dhaval Vyas, Anton Nijholt, Dirk Heylen, Alexander...