Most modern programming languages rely on exceptions for dealing with abnormal situations. Although exception handling was a significant improvement over other mechanisms like chec...
Data service is the principle application in structured P2P networks. And in many cases, we need the data to persist for a long time. So how to persist the data service and how lo...
This paper describes FT64 and Multi-FT64, single- and multi-coprocessor systems designed for high performance scientific computing with streams. We give a detailed case study of po...
Mei Wen, Nan Wu, Chunyuan Zhang, Wei Wu, Qianming ...
Abstract. The Southern California Earthquake Center initiated a major largescale earthquake simulation called TeraShake. The simulations propagated seismic waves across a domain of...
Yifeng Cui, Reagan Moore, Kim Olsen, Amit Chourasi...
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...