Abstract. Pervasive computing creates possibilities for presenting highly personalised information about the people, places and things in a building. One of the challenges for such...
We present a fully-automated technique for visualizing localized cerebral ventricle shape differences between large clinical subject groups who have received a magnetic resonance ...
Owen T. Carmichael, Paul M. Thompson, Rebecca A. D...
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
This paper presents the design and evaluation of an 8-bit adiabatic multiplier. Both the multiplier core and its built-in self-test logic have been designed using a true single-ph...
Suhwan Kim, Conrad H. Ziesler, Marios C. Papaefthy...
In this paper, we address the problem of representing human actions using visual cues for the purpose of learning and recognition. Traditional approaches model actions as space-ti...