Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
The goal of this paper is to describe a new approach to a content creation and delivery mechanism for a programming course. This approach is based on the concept of creating a lar...
Many traditional techniques for “looking inside” volumetric data involve removing portions of the data, for example using various cutting tools, to reveal the interior. This a...
Michael J. McGuffin, Liviu Tancau, Ravin Balakrish...
Service portals are systems which expose a bundle of web services to the user, allowing the specification and subsequent execution of complex tasks defined over these individual...
Debra E. VanderMeer, Anindya Datta, Kaushik Dutta,...
The development of energy-conscious embedded and/or mobile systems exposes a trade-off between energy consumption and system performance. Recent microprocessors have incorporated ...
Ankush Varma, Brinda Ganesh, Mainak Sen, Suchismit...