This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
: This paper reports the development of a system for automatically organizing Internet web pages into meaningful categories. The aim of the system is to allow Internet users to fin...
is a powerful abstraction used by intelligence analysts to conceptualize threats and understand patterns as part of the analytical process. This paper demonstrates a system that d...
Ryan Eccles, Thomas Kapler, Robert Harper, William...
Real-time embedded systems are increasingly being built using commercial-off-the-shelf (COTS) components such as mass-produced peripherals and buses to reduce costs, timeto-market...
Stanley Bak, Emiliano Betti, Rodolfo Pellizzoni, M...
As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transie...