Abstract—We consider a cognitive radio network where multiple secondary users (SUs) contend for spectrum usage, using random access, over available primary user (PU) channels. Ou...
As multi-cores arrive for mainstream desktop systems, developers must invest the effort to parallelize their applications. We present Parallel Task (short ParaTask), a solution to ...
Groups of users often have shared information needs – for example, business colleagues need to conduct research relating to joint projects and students must work together on gro...
Meredith Ringel Morris, Jarrod Lombardo, Daniel Wi...
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
The ready availability of online source code examples has changed the cost structure of programming by example modification. However, current search tools are wholly separate from...
Joel Brandt, Mira Dontcheva, Marcos Weskamp, Scott...