—Safety cases need significant amount of time and effort to produce. The required amount of time and effort can be dramatically increased due to system changes as safety cases s...
Abstract—As computing systems become increasingly pervasive, the number of applications that can benefit from or require localization capabilities continuously increases. In ind...
Safety-critical systems usually need to be compliant with a domainspecific safety standard, which in turn requires an explained and wellfounded body of evidence to show that the ...
Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans H...
—The applicability of wireless sensor networks (WSNs) to data-intensive structural health monitoring (SHM) is being heavily studied recently by the computer science domain. The a...
Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xia...
Abstract—In this paper, we discuss several scheduling algorithms to execute independent tasks with voltage overscaling. Given a frequency to execute the tasks, operating at a vol...
Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of widespread p...
Abstract—Residue Number Systems (RNS) are naturally considered as an interesting candidate to provide efficient arithmetic for implementations of cryptosystems such as RSA, ECC ...
In this paper, we apply results on number systems based on continued fraction expansions to modular arithmetic. We provide two new algorithms in order to compute modular multiplic...
—Reproducibility is the ability to obtain bitwise identical results from different runs of the same program on the same input data, regardless of the available computing resource...
Abstract—This work introduces an approach to the computerassisted implementation of mathematical functions geared toward special functions such as those occurring in mathematical...