User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Probabilistic timed automata (PTAs) are used for formal modelling and verification of systems with probabilistic, nondeterministic and real-time behaviour. For non-probabilistic ti...
The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resourc...
Ashwin Manjunatha, Ajith Ranabahu, Amit P. Sheth, ...
In this paper we propose a GPU based interactive geometric modeling approach to designing fine level features on subdivision surfaces. Displacement mapping is a technique for addi...
Cross-species computer applications have a history of blended science and humor, despite the real potential for improving the canine-human bond. New activities available to humans...
Chadwick A. Wingrave, Jeremy Rose, Todd Langston, ...