Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
The authors present frequency and amplitude discrimination thresholds for motional and vibrational stimuli presented with and without the presence of roving background signals. Pa...
This paper presents an external camera method for measuring fingertip forces by imaging the fingernail and surrounding skin. This method is an alternative to the photoplethysmog...
Yu Sun, Young-Seok Kim, John M. Hollerbach, Thenku...
Approximately 70% of the source code of a software system consists of identifiers. Hence, the names chosen as identifiers are of paramount importance for the readability of comp...
nt a new concurrency control abstraction for real-time systems called preemptible atomic regions (PARs). PARs a transactional mechanism that improves upon lock-based mutual exclus...
Jeremy Manson, Jason Baker, Antonio Cunei, Suresh ...