Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
Abstract. Phylogeny reconstruction from molecular data poses complex optimization problems: almost all optimization models are NP-hard and thus computationally intractable. Yet app...
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
Minimization of the execution time of an iterative application in a heterogeneous parallel computing environment requires an appropriate mapping scheme for matching and scheduling...
Yu-Kwong Kwok, Anthony A. Maciejewski, Howard Jay ...