Abstract— In this paper, we present an effective computational approach for learning patterns of brain activity from the fMRI data. The procedure involved correcting motion artif...
Yizhao Ni, Carlton Chu, Craig J. Saunders, John As...
In this paper we present an ecient technique to reduce the switching activity in a CMOS combinational logic network based on local logic transformations. These transformations con...
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
The increasing popularity of persistent worlds and the predicted rise of pervasive gaming, both having a strong inherent potential for role-playing, stress a classical challenge o...