In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing fairness—is impossible in the presence of dishonest majorities. A genero...
In this work, we use algebraic methods for studying distance computation and subgraph detection tasks in the congested clique model. Specifically, we adapt parallel matrix multipl...
Keren Censor-Hillel, Petteri Kaski, Janne H. Korho...
: The trend in computing systems is to combine various kinds of processing elements (PEs) to build more parallel architectures. This trend leads to more neous computing systems, fo...
Wictor Lund, Sudeep Kanur, Johan Ersfolk, Leonidas...
— Faults may occur in numerous locations of a router in a NoC platform. Compared with the faults in the data path, faults in the control path may cause more severe effects which ...
—Virtualization technology has shown immense popularity within embedded systems due to its direct relationship with cost reduction, better resource utilization, and higher perfor...
Anup Patel, Mai Daftedar, Mohamed Shalan, M. Wathe...
—This paper presents the optimisation efforts on the creation of a graph-based mapping representation of gene adjacency. The method is based on the Hi-C process, starting from Ne...
Abstract—Formal process languages inheriting the concurrency and communication features of process algebras are convenient formalisms to model distributed applications, especiall...
—We present the implementation of a volumetric JPEG 2000 codec as a real-world use case of software acceleration with GPUs and multi-core CPUs. We present a generic methodology t...
Jan G. Cornelis, Jan Lemeire, Tim Bruylants, Peter...