Requirements such as distribution or tracing have an impact on multiple classes in a system. They are cross-cutting requirements, or aspects. Their support is, by necessity, scatt...
We present design and implementation details as well as performance results for two new parallel checkpointing libraries developed by us for parallel MPI applications. The first o...
An unequal importance communication approach, for reliable and real-time image communication over heterogeneous networks and its applications in mobile communication systems is pre...
Mehdi Malboubi, Ahmad Bahai, Mustafa Ergen, Pravin...
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
A top-down approach for workflow design is proposed in the framework of Petri net theory. Simple but powerful refinement rules are proposed that guarantee soundness of the resultin...
Piotr Chrzastowski-Wachtel, Boualem Benatallah, Ra...