This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...
Inexpensive data collection and storage technologies and a global thirst for information have led to data repositories so large that users may become disoriented and unable to loc...
Abstract - This paper introduces new analyses and algorithms which are essential for the practical implementation of continuous backbone continuum robots. Actuator length limits st...
Distributed Hash Tables (DHT) algorithms obtain good lookup performance bounds by using deterministic rules to organize peer nodes into an overlay network. To preserve the invaria...