The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
We report on the development of a visual programming environment for building applications for execution on a range of parallel computing platforms. This work exploits the dataflo...
Fault tolerance is a constant concern in data centers where servers have to run with a minimal level of failures. Changes on the operating conditions or on server demands, and var...
Beautification of vague, imprecise sketchy ink input is an interesting area for exploration, especially with the emergence of pen-based systems, such as the Tablet PC. Fifty perce...
An ontological knowledge management system requires dynamic and encapsulating operation in order to share knowledge among communities. The key to success of knowledge sharing in t...