—It has been widely acknowledged that online storage systems within the “cloud” of the Internet provide services of a substantial value to end users who wish to share files ...
Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zh...
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Tracing algorithms visit reachable nodes in a graph and are central to activities such as garbage collection, marshalling etc. Traditional sequential algorithms use a worklist, re...
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...