The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
This paper presents the influence of the loop nest splitting source code optimization on the worst-case execution time (WCET). Loop nest splitting minimizes the number of executed...
A tuple t1 of relation R subsumes tuple t2 of R, with respect to a query Q if for every database, tuple t1 derives all, and possibly more, answers to query Q than derived by tuple ...
A fundamental issue in user interface design is the effective use of available screen space, commonly referred to as the screen real estate problem. This paper presents a new dist...
M. Sheelagh T. Carpendale, David J. Cowperthwaite,...
Agent-based models (ABMs) are powerful in describing structured epidemiological processes involving human behavior and local interaction. The joint behavior of the agents can be v...
Georgiy V. Bobashev, D. Michael Goedecke, Feng Yu,...