In this paper, we present a runtime method for scheduling parallel applications on dynamic and heterogeneous platforms. It can be used to schedule parallel applications whose tota...
Salah-Salim Boutammine, Daniel Millot, Christian P...
In this paper we extend the notion of k-anonymity in the context of databases with timestamped information in order to naturally define k-anonymous views of temporal data. We als...
Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wa...
In order to self-assemble desired DNA nanostructure, it is necessary to suppress assembly errors caused by fluctuations of temperature and concentration. We propose a microfluidic ...
We show that the Vickrey auction, despite its theoretical benefits, is inappropriate if “antisocial” agents participate in the auction process. More specifically, an antisoc...
Abstract. We present a method of specifying standard imperative program optimisations as a rewrite system. To achieve this we have extended the idea of matching sub-terms in expres...