The paper introduces Network-on-Chip (NoC) design methodology and low cost mechanisms for supporting efficient cache access and cache coherency in future high-performance Chip Mul...
Evgeny Bolotin, Zvika Guz, Israel Cidon, Ran Ginos...
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Meme Tags are part of a body of research on GroupWear: a wearable technology that supports people in the formative stages of cooperative work. Conference participants wear Meme Ta...
Richard Borovoy, Fred Martin, Sunil Vemuri, Mitche...
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
In this paper we introduce a prototype job portal which uses semantically annotated job offers and applicants. In our opinion, using Semantic Web technologies substantially increa...
Malgorzata Mochol, Holger Wache, Lyndon J. B. Nixo...