This paper reports a field evaluation of the mobile phone as a `package' of device and services. The evaluation compares 44 university students' usage and user experienc...
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
To transfer video streams with the application level QoS (Quality of Service) guarantees on the end-to-end transfer delay and the video quality, the coding algorithm and parameter...
Multimedia presentations comprise various media objects such as text, audio, image, and video that are delivered to users according to certain temporal relationships. In stored mul...
Parameter-space studies involve running a single application several times with different parameter sets. Since the jobs are mutually independent, many computing resources can be r...
Anand Natrajan, Marty A. Humphrey, Andrew S. Grims...