The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
With the end of clock-frequency scaling, parallelism has emerged as the key driver of chip-performance growth. Yet, several factors undermine efficient simultaneous use of onchip ...
We build an efficient and reliable data transport protocol on top of the Short Message Service (SMS). We conduct a series of experiments to characterize SMS behaviour under bursty...
There has been a growing interest to develop technologies for laboratory environments. However, existing systems are underdeployed in real research labs. In order to create more s...
The context of this work is the search for realism and believability of Virtual Humans. Our contribution to achieve this goal is to enable Virtual Humans (VH) to react to spontane...