: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Application execution time prediction is of key importance in making decisions about efficient usage of Grid resources. Grid services lack support of a generic application executi...
Farrukh Nadeem, Muhammad Murtaza Yousaf, Radu Prod...
Traffic measurement is a critical component for the control and engineering of communication networks. We argue that traffic measurement should make it possible to obtain the spati...
V-cal is a calculus designed to support the compilation of data parallel languages that allows to describe program transformations and optimizations as semantics preserving rewrite...
P. F. G. Dechering, J. A. Trescher, J. P. M. de Vr...