This paper presents a novel method for inferring the odor based on neural activities observed from rats’ main olfactory bulbs. Multi-channel extra-cellular single unit recording...
We have developed new methods for log-based recovery for middleware servers which involve thread pooling, private inmemory states for clients, shared in-memory state and message i...
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...