Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
—While array structures are a significant source of power dissipation, there is a lack of accurate high-level power estimators that account for varying array circuit implementat...
Mahesh Mamidipaka, Kamal S. Khouri, Nikil D. Dutt,...
In this paper we introduce a MySQL code generator for a significant subset of OCL expressions which is based on the use of stored procedures for mapping OCL iterators. Our code gen...
In this paper, we first describe a formative empirical study to inform the design of CSCW tools to support idea finding in co-located groups. Groups of students worked on creative...
Thorsten Prante, Carsten Magerkurth, Norbert A. St...
As driver distraction from in-vehicle devices increasingly becomes a concern on our roadways, researchers have searched for better scientific understanding of distraction along wi...
Dario D. Salvucci, Mark Zuber, Ekaterina Beregovai...