We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software pri...
This paper presents a portable, efficient method for accessing memory resident persistent objects in virtual memory in the context of the E programming language. Under the approac...
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. I...
Business-to-Business (B2B) collaboration is becoming a pivotal way to bring today’s enterprises to success in the dynamically changing e-business environment. Though many busine...
The evolution of distributed applications to reflect structural changes or to adapt to specific conditions of the run-time environment is a difficult issue especially if continuou...
Noel De Palma, Sara Bouchenak, Slim Ben Atallah, D...