Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
This paper focuses on non-strict processing, optimization, and partial evaluation of MPI programs which use incremental data structures (ISs). We describe the design and implement...
This paper presents a concept adopted by ATHENA IST-507312 project for the proper adoption of digital switchover (DSO), i.e. the transition form analogue to digital broadcasting in...
Evangelos Pallis, Charalambos Mantakas, George Mas...
RSD (Resource and Service Description) is a software architecture for specifying, registering and accessing resources and services in complex heterogeneous computing environments....
The requirement for ubiquitous service access in wireless environments presents a great challenge in light of well known problems like high error rate and frequent disconnections....
Vasileios Baousis, Vassilis Spiliopoulos, Elias Za...