—In this paper we are concerned with allowing the operator of a haptic display to interact with virtual systems having significant inertial dynamics and realistic constraints. We...
Eric L. Faulring, Kevin M. Lynch, J. Edward Colgat...
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
In this paper, we describe an application-level emulator for P2P systems with a special focus on high reproducibility. We achieve reproduciblity by taking control over the schedul...
Roberto Roverso, Mohammed Al-Aggan, Amgad Naiem, A...
We developed and tested a website and public display to connect and sustain carpoolers in the workplace. We arrived at this design through study of traffic congestion and its caus...
Information systems often present virtual spaces that are sufficient to enable important human interaction. By enabling such interaction, systems designers are inherently creating...