Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Abstract. In this paper we evaluate the data transmission performance of a generalized multiple-tree-based overlay architecture for peer-to-peer live streaming that employs multipa...
Automatic tuning has been an elusive goal for database technology for a long time and is becoming a pressing issue for modern E-services. This paper reviews and assesses the advan...
Cognitive radios are devices capable of sensing a large range of frequencies in order to detect the presence of primary networks and reuse their bands when they are not occupied. D...
Jonathan Verlant-Chenet, Julien Renard, Jean-Miche...
Synchronous functional languages such as Lustre or Lucid Synchrone define a restricted class of Kahn Process Networks which can be executed with no buffer. Every expression is as...