Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
We present a model that enables us to analyze the running time of an algorithm on a computer with a memory hierarchy with limited associativity, in terms of various cache parameter...
We describe an automated method to generating models of an autonomic system. Specifically, we generate UML state diagrams for a set of interacting objects, including the extensio...
Heather Goldsby, Betty H. C. Cheng, Philip K. McKi...
— Pervasive computing is a new and emerging technology. The concept of pervasiveness and its deployment into reality are still not well aligned. This is because the vision of per...
Fiona Mahon, Jelena Mitic, Micheal Crotty, Kevin D...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...