Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
This paper describes the implementation of a runtime library for asynchronous communication in the Cell BE processor. The runtime library implementation provides with several servi...
Collection management policies of libraries were mainly shaped by in-house use of materials in the past. Yet the emergence of electronic journals and their availability through pu...
- Many software development platforms provide a large number of library components to make it easy to build high quality software. On the other hand, it became more and more diffic...
This paper addresses a novel approach that integrates two different types of information resources: the World Wide Web and libraries. This approach is based on a hypothesis: advan...