In this paper, we present an early performance evaluation of a 624-core cluster based on the Intel® Xeon® Processor 5560 (code named “Nehalem-EP”, and referred to as Xeon 55...
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Planning a path to a destination, given a number of options and obstacles, is a common task. We suggest a two-component cognitive model that combines retrieval of knowledge about t...
Breast biopsy guided by imaging techniques such as ultrasound is widely used to evaluate suspicious masses within the breast. Currently, ultrasound imaging does not allow live guid...
Vishnu Mallapragada, Nilanjan Sarkar, Tarun Kanti ...