In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
This paper demonstrates how an Instruction Path Coprocessor (I-COP) can be efficiently implemented using the PipeRench reconfigurable architecture. An I-COP is a programmable on-c...
Yuan C. Chou, Pazhani Pillai, Herman Schmit, John ...
The Olfactory Receptor Database (ORDB) is a WWWaccessible database that has been expanded from an olfactory receptor resource to a chemoreceptor resource. It stores data on six cl...
Emmanouil Skoufos, Luis N. Marenco, Prakash M. Nad...
An object-oriented (OO) framework for Partial tial Equations (PDEs) provides software abstractions for numerical simulation of PDEs. The design of such frameworks is not trivial, a...
Magne Haveraaen, Hans Z. Munthe-Kaas, Krister &Ari...
There are a number of different approaches for automatically selecting video clips from a video database and sequencing them into meaningful presentations for viewers. The video d...