: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
The distortion operator transforms 2D images in a manner similar to image warping or morphing, allowing source pixels to be mapped to any destination pixel. This operator can be i...
— Java, a popular programming language on desktop systems, is rarely used in embedded systems. Some features of Java, like thread support in the language, could greatly simplify ...
A web application has been developed using the Microsoft .NET technology, which allows to use the Mathematica software from any personal computer connected to Internet. It is not n...