ed underlying grid infrastructure to an application) allowed us to reuse an existing game engine without the need to make any significant changes to it. In this paper we examine th...
Glenn Deen, Matthew Hammer, John Bethencourt, Iris...
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
Architectural advances of modern systems has often been at odds with control complexity, requiring significant effort in both design and verification. This is particularly true ...
Reducing the power consumption of computing devices has gained a lot of attention recently. Many research works have focused on reducing power consumption in the off-chip buses as...
Dinesh C. Suresh, Banit Agrawal, Jun Yang 0002, Wa...
This paper outlines a series of experiments to develop asynchronous messaging systems for preschool aged children. Three unique systems build on a foundational design called Toast...
Hayes Raffle, Rafael Ballagas, Glenda Revelle, Koi...