Networks are a shared resource connecting critical IT infrastructure, and the general practice is to always leave them on. Yet, meaningful energy savings can result from improving...
As part of the design of the next generation Naval Amphibious Transport Dock Ship (LPD17), simulation was used to evaluate the arrangement and flow of cargo on the ship and to int...
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
We apply an information-theoretic cost metric, the symmetrized Kullback-Leibler (sKL) divergence, or -divergence, to fluid registration of diffusion tensor images. The difference b...
Ming-Chang Chiang, Alex D. Leow, Andrea D. Klunder...