—Many scalable reliable multicast protocols use the local repair scheme where certain receivers retransmit packets by other receivers. Such schemes need a mechanism, called messa...
This paper proposes a family of replication protocols based on group communication in order to address some of the concerns expressed by database designers regarding existing repl...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Abstract. We analyse the validity of several common program transformations in multi-threaded Java, as defined by the Java Memory Model (JMM) section of Chapter 17 of the Java Lang...
The adoption of Domain-Specific Modeling Languages (DSMLs) for generating framework-based applications has proved to be an effective way of enforcing the correct use of frameworks...