We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software pri...
Providing QoS (Quality of Service) in batch resources against the uncertainty of resource availability due to the space-sharing nature of scheduling policies is a critical capabil...
Yang-Suk Kee, Carl Kesselman, Daniel Nurmi, Richar...
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
The literature in the field of knowledge management shows a certain preoccupation with information technology (IT) and technical solutions while it reflects a limited view of orga...
Many software systems contained cloned code, i.e., segments of code that are highly similar to each other, typically because one has been copied from the other, and then possibly m...