This paper demonstrates a formal verificationplanning process and presents associated verification strategy that we believe is an essential (yet often neglected) step in an ASIC o...
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
An analytical and experimental investigation of a jet pipe controlled electropneumatic servoactuator designed for use in the Utah/MIT dextrous hand (UMDH) has been performed. An ac...
We present TFWC, a TCP-friendly window-based congestion control mechanism for real-time multimedia streaming applications. Although TFRC is regarded as a de facto standard for tho...
This paper describes the StorySpinner system, a sculptural hypertext reader used as a test bed for experimenting with the authoring of narrative flow in automatically generated st...