Whenever large homogeneous data structures need to be processed in a non-trivial way, e.g. in computational sciences, image processing, or system simulation, high-level array prog...
A commercial-off-the-shelf (COTS) component is an implementation of common functionality among family members, where an in-house component implements an organization-specific func...
Discovering association rules by identifying relationships among sets of items in a transaction database is an important problem in Data Mining. Finding frequent itemsets is compu...
Induction and abduction are well known non-deductive inferences. We shall propose that design is also another form of non-deductive inference, and, based on Barwise and Seligmanâ€...
In this paper we present a novel communication layer for distributed heterogenous environments typical found in the area of Grid computing. This communication layer is used as par...
The paper presents a method in teaching software process at under-graduate level, based on the Personal Software Process (PSP). The goal is to inform students about the process an...
– The threat of DDoS attack are mainly directed at home and SOHO network that lacks the incentive, expertise, and financial means to defend themselves. This paper proposes an Aut...
Imitation enables the individuals to acquire new abilities, and encourages social interaction and cultural transfer. The capability to obtain new abilities by observation represen...
This paper presents a new technique of recovery for object-based Distributed Shared Memory (DSM) systems. The new technique, integrated with a coherence protocol for atomic consis...