n, important for interoperability only. We can make abstraction from the representation of the elements of GF(28 ) and consider a block cipher that operates on strings of elements ...
In this paper 1 we describe the design, implementation and evaluation of a software framework that supports the development of mobile, context-aware trails-based applications. A t...
The popularity of social information systems has been driven by their ability to help users manage, organize and share online resources. Though the research exploring the use of ta...
Abstract. Branch predictors are associated with critical design issues for nowadays instruction greedy processors. We study two important domains where the optimization of decision...
Patrick Carribault, Christophe Lemuet, Jean-Thomas...
It is a challenge to design and implement a wide-area distributed hash table (DHT) which provides a storage service with high reliability. Many existing systems use replication to...
Jing Zhao, Hongliang Yu, Kun Zhang, Weimin Zheng, ...