In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
This paper considers whether the seemingly disparate fields of Computational Intelligence (CI) and computer architecture can profit from each others’ principles, results and e...
This paper discusses two projects aimed at utilising the educational potential of hypermedia whilst avoiding the danger of the user becoming “lost in hyperspace”. The first pr...
David J. Moore, Dave J. Hobbs, D. Mullier, C. Bell
The paper presents a hierarchical modeling approach of the N version programming in a real – time environment. The model is constructed in three layers. At the first layer we d...
CMOS technology should, over the next few years, reach lithography of under 0.1¡ . This provides a die area improvement of a factor of 10 over today’s technology. What is the b...