An important threat to reliable storage of data is silent data corruption. In order to develop suitable protection mechanisms against data corruption, it is essential to understan...
Lakshmi N. Bairavasundaram, Garth R. Goodson, Bian...
Many different rules for decision making have been introduced in the literature. We show that a notion of generalized expected utility proposed in [Chu and Halpern 2003] is a uni...
We present the design and implementation of CGD, the CryptoGraphic Disk driver. CGD is a pseudo-device driver that sits below the buffer cache, and provides an encrypted view of a...
In this case study, we compare two methods for filtering external motion in time dependent volume data sets acquired from confocal microscopy. The pros and cons of a landmark bas...
: Large polygon meshes are a common entity in scienti c and engineering science. Polygon meshes can be used for simpli ed geometric operations such as collision detection and surfa...