We present a scalable framework for parallelizing greedy graph coloring algorithms on distributed-memory computers. The framework unifies several existing algorithms and blends a ...
Doruk Bozdag, Assefaw Hadish Gebremedhin, Fredrik ...
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
— Social interaction history refers to traces of social interaction in information spaces. These traces have potential to help users explore and navigate through information spac...
—Most virtual reality simulators are designed for complex medical procedures, such as laparoscopic surgery. While important, these simulators are of use for only a subset of spec...
Nader S. Raja, John A. Schleser, William P. Norman...
Maintaining an asset with life-limited parts, e.g., a jet engine or an electric generator, may be costly. Certain costs, e.g., setup cost, can be shared if some parts of the asset ...
Tao Sun, Qianchuan Zhao, Peter B. Luh, Robert N. T...