Virtual Tomographic Reflection (VTR) is a new augmented reality technique that allows users to view volumetric image data using an interaction paradigm based on medical ultrasoun...
Damion Shelton, Bing Wu, Roberta L. Klatzky, Georg...
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
Abstract Flow Accounting is a passive monitoring mechanism implemented in routers that gives insight into trac behavior and network characteristics. However, processing of Flow Ac...
The vision of Pervasive and Ubiquitous Computing promises that our future environments will be furnished with an increasing number of computationally augmented artifacts. Conseque...
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...