Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Current IP phone architectures which bring phone services to a distributed open environment are eraltively static and do not scale well. An IP phone environment should be more dyn...
Optimizing programs at run-time provides opportunities to apply aggressive optimizations to programs based on information that was not available at compile time. At run time, prog...
Process skew is an important factor in the performance of parallel applications, especially in large-scale clusters. Reduction is a common collective operation which, by its natur...
Adam Wagner, Darius Buntinas, Dhabaleswar K. Panda...
In: Proceedings of the Eleventh International Conference on Cooperative Information Systems (CoopIS-03), pp. 93–109, Springer-Verlag LNCS Series. c 2003 by Springer-Verlag. We a...