Delays and errors are the frequent consequences of people having difficulty with a user interface. Such delays and errors can result in severe problems, particularly for mission-...
Abstract. We propose a new EEG-based wireless brain computer interface (BCI) with which subjects can “mind-type” text on a computer screen. The application is based on detectin...
Nikolay Chumerin, Nikolay V. Manyakov, Adrien Comb...
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
Parallelization of embedded software is often desirable for power/performance-related considerations for computation-intensive applications that frequently occur in the signal-pro...
Sankalita Saha, Shuvra S. Bhattacharyya, Wayne Wol...