This paper demonstrates the utilization of immersive virtual reality environments in the investigation of operations simulation results. The authors outline the benefits offered b...
Gordon D. Rehn, Marco Lemessi, Judy M. Vance, Deni...
In this paper we extend Inagaki Weighted Operators fusion rule (WO) [see 1, 2] in information fusion by doing redistribution of not only the conflicting mass, but also of masses o...
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
Abstract. In this paper, we study the security of the Encrypt-MaskDecrypt mode of operation, also called EMD, which was recently proposed for applications such as disk-sector encry...
The first decades of the new millennium will witness an explosive growth in the number and diversity of networked devices and portals. We foresee high degrees of mobility, hetero...
Fabio Kon, Roy H. Campbell, M. Dennis Mickunas, Kl...