Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
The adoption of advanced integration technologies that enable private and public organizations to seamlessly execute their business transactions electronically is still relatively...
Till Janner, Fenareti Lampathaki, Volker Hoyer, Sp...
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Virtual interactive student-oriented learning environment (VISOLE) is a game-based constructivist pedagogical approach that encompasses the creation of an online interactive world ...
Kevin K. F. Cheung, Morris Siu Yung Jong, Fong Lok...
In the Intelligent Robotics Laboratory (IRL) at Vanderbilt University we seek to develop service robots with a high level of social intelligence and interactivity. In order to ach...
Mitchell Wilkes, W. Anthony Alford, Robert T. Pack...