The computational science community is reluctant to write largescale computationally-intensive applications in Java due to concerns over Java’s poor performance, despite the cla...
Christopher Riley, Siddhartha Chatterjee, Rupak Bi...
In this paper we consider the task of classifying materials into explosives and non-explosives according to features obtainable from Multi-Energy X-ray Computed Tomography (MECT) ...
Limor Eger, Synho Do, Prakash Ishwar, W. Clem Karl...
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
We describe the design process of an affective control toy, named SenToy, used to control a synthetic character in a computer game. SenToy allows players1 to influence the emotion...
Internet search has a strong business model that permits a free service to users, so it is difficult to see why, if at all, there should be open source offerings as well. This pa...
Wray L. Buntine, Karl Aberer, Ivana Podnar, Martin...