Knox College
Computer Science
We have replicated the experiments of Cecchet et al. detailed in "Performance and Scalability of EJB Applications" at OOPSLA '02. We report on our experiences configuring, deploying and tuning Enterprise software. We found a number of... more
- by Jaime Spacco
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, access control, and other simple forms of behavioral... more
We explore advances in Java Virtual Machine (JVM) technology along with new high performance I/O libraries in Java 1.4, and find that Java is increasingly an attractive platform for scientific clusterbased message passing codes. We report... more
Testing is an important part of the software development cycle that should be covered throughout the computer science curriculum. However, for students to truly learn the value of testing, they need to benefit from writing test cases for... more
Valiant routing, the use of a random intermediate node to distribute network traffic, has been proposed for a number of recent HPC network topologies. It is also commonly used as a bulding block for adaptive routing algorithms, which use... more
Cryptologia Publication details, including instructions for authors and subscription information: Abstract In 1967's The Broken Seal: The Story of ''Operation Magic'' and the Pearl Harbor Disaster, Ladislas Farago claimed that Herbert... more
The use of wireless telegraphy-radio-during World War I marked the advent of modern cryptology. For the first time, commanders were sending enciphered messages to front line troops and for the first time, the enemy had an enormous amount... more
What would happen if all of the algorithms in public-key cryptography suddenly could be broken in seconds or minutes? Those algorithms, like RSA and elliptic curve cryptography are the ones that we depend on for Internet commerce. What if... more
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the... more
Industry trends showcase the increasing importance of soft skills, but interpersonal STEM education is not yet well defined [7, 14]. With high technology churn and increasingly higher-level programming practices, the need for effective... more
Textbooks and courses on numerical algorithms contain numerous examples which lead students to believe that the algorithm of choice for computing the zeros of a function f(x) is Newton's algorithm. In many of these courses little or no... more