Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
Instruction reuse is a microarchitectural technique that improves the execution time of a program by removing redundant computations at run-time. Although this is the job of an op...
This paper describes our continued work of a unique robotics project, Comprehensive Access to Printed Materials (CAPM), within the context of libraries. As libraries provide a gro...
Jackrit Suthakorn, Sangyoon Lee, Yu Zhou, G. Sayee...
Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most su...
Karl Andersson, Andrea G. Forte, Henning Schulzrin...
Intelligence analysis is difficult due to the volume and complexity of the data, as well as the subtlety of the connections that have to be made in order to identify threats. Info...
John Booker, Timothy Buennemeyer, Andrew J. Sabri,...