In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
This paper considers whether the seemingly disparate fields of Computational Intelligence (CI) and computer architecture can profit from each others’ principles, results and e...
This paper discusses two projects aimed at utilising the educational potential of hypermedia whilst avoiding the danger of the user becoming “lost in hyperspace”. The first pr...
David J. Moore, Dave J. Hobbs, D. Mullier, C. Bell
The paper presents a hierarchical modeling approach of the N version programming in a real – time environment. The model is constructed in three layers. At the first layer we d...
CMOS technology should, over the next few years, reach lithography of under 0.1¡ . This provides a die area improvement of a factor of 10 over today’s technology. What is the b...
Metacomputing is an emergent paradigm that makes possible to distribute applications over a heterogeneous set of computing systems to exploit all available resources. The paper pr...
Antonio Corradi, Letizia Leonardi, Franco Zambonel...
Two years ago [3] we began to study a R.I.S.C. approachfor smart card microprocessors. We reconsider this research to answer the question of the new technology of smart cards: the...