We present a method for producing real-time volume visualizations of continuously captured, arbitrarily-oriented 2D arrays (slices) of data. Our system constructs a 3D representat...
William F. Garrett, Henry Fuchs, Mary C. Whitton, ...
Exploratory data analysis is a process of sifting through data in search of interesting information or patterns. Analysts’ current tools for exploring data include database mana...
The central task of current profile control during the ramp-up phase of a tokamak discharge is to find the actuator trajectories that are necessary to achieve certain desired curre...
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...