Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
CRIKEY is a planner that separates out the scheduling from the classical parts of temporal planning. This can be seen as a relaxation of the temporal information during the classic...
This article describes an architecture for translating speech into Spanish Sign Language (SSL). The architecture proposed is made up of four modules: speech recognizer, semantic a...
Most work with geospatial data, whether for scientific analysis, urban and environmental planning, or business decision making is carried out by groups. In contrast, geographic vi...
Isaac Brewer, Alan M. MacEachren, Hadi Abdo, Jack ...
Strong representative democracies rely on educated, informed, and active citizenry to provide oversight of the government. We present Connect 2 Congress (C2C), a novel, high tempo...