Previous work on the production and test of various sonifications has shown that adding a sonification to an interface can assist the execution of a variety of operator tasks [1,2...
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
This paper presents a simple approach for rendering isosurfaces of a scalar field. Using the vertex programming capability of commodity graphics cards, we transfer the cost of com...
Abstract. Due to the few computing resource planning options currently available in Grid computing, capacity planning, an old discipline for analyzing resource purchases, is simple...
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has ma...