— Achieving high performance for out-of-core applications typically involves explicit management of the movement of data between the disk and the physical memory. We are developi...
Sriram Krishnamoorthy, Juan Piernas, Vinod Tippara...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Abstract. We present a goal-based approach for visualizing and browsing the search space of available Web services. A goal describes an obthat a client wants to solve by using Web ...
Abstract. Time and timing features are an important aspect of modern electronic systems, often of embedded nature. We argue here that in early design phases, time is often of logic...
We present a framework that we are developing to better solve several critical issues that arise when interactive systems are extended to large displays. These issues include slow...