: Cognitive informatics (CI) studies the natural intelligence and internal information processing mechanisms of the brain, as well as the processes involved in perception and cogni...
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
: To aid job seekers searching for job vacancies, we have developed a new configurable meta-search engine for the human resources domain. In this paper we describe the three main c...
Engineering distributed systems is a challenging activity. This is partly due to the intrinsic complexity of distributed systems, and partly due to the practical obstacles that de...
Yanyan Wang, Matthew J. Rutherford, Antonio Carzan...
Increasing demand for larger high-performance applications requires developing more complex systems with hundreds of processing cores on a single chip. To allow dynamic voltage sc...