A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
HeteroSort load balances and sorts within static or dynamic networks using a conceptual torus mesh. We ported HeteroSort to a 16-node Beowulf cluster with a central switch architec...
Pamela Yang, Timothy M. Kunau, Bonnie Holte Bennet...
Wedescribe the use of a recommendersystem to enable continuousknowledgeacquisition and individualized tutoring of application software across an organization. Installing such syst...
Frank Linton, Deborah Joy, Hans-Peter Schaefer, An...
As a platform for community networks, public information spaces that mirror the city metaphor are being developed around the world. The aim of digital cities is to pursue a future ...
Interactive robotics demands real-time visual information about the environment. Real time vision processing, however, places a heavy load on the robot’s limited resources, and m...
Bruce A. Maxwell, Nathaniel Fairfield, Nikolas Joh...