Abstract. Running scientific workflows in distributed environments is motivating the definition of provenance gathering approaches that are loosely coupled to the workflow executio...
Anderson Marinho, Leonardo Gresta Paulino Murta, C...
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Grid data streaming applications are novel from others in that they require real-time data supply while the processing is going on, which necessitates harmonious collaborations am...
Abstract--Hardware/Software codesign of Elliptic Curve Cryptography has been extensively studied in recent years. However, most of these designs have focused on the computational a...
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for th...