As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
Control independence has been put forward as a significant new source of instruction-level parallelism for future generation processors. However, its performance potential under p...
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Computer Assisted Language Learning (CALL) applications for improving the oral skills of low-proficient learners have to cope with nonnative speech that is particularly challengin...
Joost van Doremalen, Catia Cucchiarini, Helmer Str...
Four time-frequency and time-scale methods are studied for their ability of detecting myoclonic seizures from accelerometric data. Methods that are used are: the short-time Fourier...
Tamara M. E. Nijsen, Ronald M. Aarts, Pierre J. M....