Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
The illusion of self-motion induced by moving visual stimuli (“vection”) has typically been attributed to low-level, bottom-up perceptual processes. Therefore, past research h...
Shared workspace systems provide virtual places for selforganized and semi-structured cooperation between local and distributed team members. These cooperation systems have been a...
Off-Chip buses constitute a significant portion of the total system power in embedded systems. Past research has focused on encoding contiguous bit positions in data values to red...
Dinesh C. Suresh, Banit Agrawal, Jun Yang 0002, Wa...
Storage and retrieval technology for large-scale medical image systems has matured significantly during the past ten years but many implementations still lack cost-effective backu...
H. K. Huang, Aifeng Zhang, Brent J. Liu, Zheng Zho...