Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Data management and analysis has become an integral component in the area of reservoir engineering. An important metric that determines the overall effectiveness of data analysis i...
Jing Zhao, Na Chen, Karthik Gomadam, Viktor K. Pra...
Maritime search and rescue operations are critical missions involving personnel, boats, helicopter, aircrafts in a struggle against time often worsened by adversary sea and weather...
Salvatore Aronica, Francesco Benvegna, Massimo Cos...
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
MobileASL is a video compression project for two-way, real-time video communication on cell phones, allowing Deaf people to communicate in the language most accessible to them, Am...
Jessica J. Tran, Tressa W. Johnson, Joy Kim, Rafae...