JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Abstract. The present study examined our ability to identify the location of a single vibration delivered to the dorsal and/or volar side of the forearm near the wrist. Three parti...
Hsiang-Yu Chen, Joseph Santos, Matthew Graves, Kwa...
In this paper, the development of a three-dimensional (3-D) odometry system for wheeled robots on loose soil in an application of planetary exploration is described. When a wheele...
In this paper, we present Collaborative Opportunistic Recovery Algorithm (CORA) designed for multicast multimedia applications with low loss as well as latency constraints in ad h...
Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Pa...
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...