If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
While genomic sequencing projects have proved an abundant source of information for biological studies ranging from the molecular to the ecological in scale, much of the informati...
Douglas W. Raiford, Dan E. Krane, Travis E. Doom, ...
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
A design flow for processor platforms with on-chip coarse-grain reconfigurable logic is presented. The reconfigurable logic is realized by a 2-Dimensional Array of Processing Elem...
Michalis D. Galanis, Grigoris Dimitroulakos, Const...