Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Integrating web sites to provide more efficient services is a very promising way in the Internet. For example searching house for rent based on train system or preparing a holiday...
This paper describes the Hapticat , a device we developed to study affect through touch. Though intentionally not highly zoomorphic, the device borrows behaviors from pets and th...
Steve Yohanan, Mavis Chan, Jeremy Hopkins, Haibo S...
In this paper, we propose a middleware library for efficiently developing distributed cooperative applications consisting of a large number of cellular phones with Java executors....
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...