Memory is one of the scarcest resource of embedded and constrained devices. This paper studies the memory footprint benefit of pre-deploying embedded Java systems up to their acti...
Cross-species computer applications have a history of blended science and humor, despite the real potential for improving the canine-human bond. New activities available to humans...
Chadwick A. Wingrave, Jeremy Rose, Todd Langston, ...
The use of elliptic curves in cryptography relies on the ability to count the number of points on a given curve. Before 1999, the SEA algorithm was the only efficient method known ...
This paper discusses some of the issues involved in implementing a shared-address space programming model on large-scale, distributed-memory multiprocessors. While such a programm...
David A. Kranz, Kirk L. Johnson, Anant Agarwal, Jo...
The Testbed and Applications working group of the European Grid Forum (EGrid) is actively building and experimenting with a grid infrastructure connecting several research-based s...
Gabrielle Allen, Thomas Dramlitsch, Tom Goodale, G...