—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
We present a quality management method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions are unkno...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...