The effectiveness of simulation-based training for individual tasks – such as piloting skills – is well established, but its use for team training raises challenging technical...
David R. Traum, Jeff Rickel, Jonathan Gratch, Stac...
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
Content-Based Image Retrieval (CBIR) presents several challenges and has been subject to extensive research from many domains, such as image processing or database systems. Databa...
Ricardo da Silva Torres, Celmar G. Silva, Claudia ...
The paper addresses limitations of strictly interactive theories of videogame genre, proposes a supplementary, historicist inter-media alternative, and interprets the videogame Ka...
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...