In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
The aim of DICE is the improvement of communication between culture-providers (institutions, museums, etc.) and different categories of users (scholars, publishers, culturaltouris...
Checkpointing virtual machines shows potential for allowing a user to download, install, and initialize a complete software environment by selecting a web page link. Starting with...
When using communication in multi-robot systems it's often not desirable to choose an form of communication that separates the messages from the physical environment in which...
Abstract. In this paper we study the problem of solving hard propositional satisfiability problem (SAT) instances in a computing grid or cloud, where run times and communication b...