This article comprehensively surveys the work accomplished during the past decade on an approach to analyze concurrent systems qualitatively and quantitatively, by combining functi...
Nicolas Coste, Hubert Garavel, Holger Hermanns, Fr...
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
Although mobile devices are rich sources of context information, the distribution of context in mobile environments is often hindered by the limited battery life, and wireless con...
Timo Koskela, Janne Lahti, Jani Pellikka, Sari J&a...
OpenH323 is an open source H.323 implementation that has been ported to IPv6. In this paper we briefly introduce the library architecture and the performance citeria with which th...
Service engineering and service-oriented architecture as an integration and platform technology is a recent approach to software systems integration. Software quality aspects such ...