We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
— Hyper-heuristics or “heuristics to chose heuristics” are an emergent search methodology that seeks to automate the process of selecting or combining simpler heuristics in o...
Neither `design' nor `evolutionary' approaches to building behavior-based robots feature a role for development in the genesis of behavioral organization. However, the n...
This paper presents a comprehensive statistical analysis of workloads collected on data-intensive clusters and Grids. The analysis is conducted at different levels, including Virt...