Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
We give an example of a noncongruence subgroup Γ ⊂ SL(2, Z) whose space of weight 3 cusp forms S3(Γ) admits a basis satisfying the Atkin-Swinnerton-Dyer congruence relations wi...
Liqun Fang, J. William Hoffman, Benjamin Linowitz,...
The new generation of open networked IT systems poses particular challenges to software engineering due to their evolving nature and their high quality requirements. In particular...
This paper presents the implementation of MPICH2 over the Nemesis communication subsystem and the evaluation of its shared-memory performance. We describe design issues as well as...
This paper presents a case study about the applicability and usage of non blocking collective operations. These operations provide the ability to overlap communication with computa...
Torsten Hoefler, Peter Gottschling, Andrew Lumsdai...