Applications must scale well to make efficient use of even medium-scale parallel systems. Because scaling problems are often difficult to diagnose, there is a critical need for sc...
Nathan R. Tallent, John M. Mellor-Crummey, Michael...
Most programming languages support a call stack in the programming model and also in the runtime system. We show that for applications targeting low-power embedded microcontroller...
: This keynote reports on a new class of processes - so called fluid processes - whose ”engineering” and ”use” is indistinguishable. Fluid processes are continually being ...
In this paper we present a way to integrate web proxies with smart card based authentication systems. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentic...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...