While many multimedia systems allow the association of semantic annotations with media assets, there is no agreedupon way of sharing these among systems. As an initial step within...
Lynda Hardman, Zeljko Obrenovic, Frank Nack, Brigi...
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
Broad web search engines as well as many more specialized search tools rely on web crawlers to acquire large collections of pages for indexing and analysis. Such a web crawler may...
In this paper, we investigate some of the issues that arise when mobile nodes engage voice connections with remote peers by using a wireless ad hoc network (MANET–cell) to acces...
Elena Fasolo, Federico Maguolo, Andrea Zanella, Mi...
—Most virtual reality simulators are designed for complex medical procedures, such as laparoscopic surgery. While important, these simulators are of use for only a subset of spec...
Nader S. Raja, John A. Schleser, William P. Norman...