Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Abstract. This paper presents a framework that lets a component developer provide a component user with different kinds of information, depending on the specific context and needs....
Alessandro Orso, Mary Jean Harrold, David S. Rosen...
Intravascular ultrasonography and x-ray angiography provide two complimentary techniques for imaging the moving coronary arteries. We present a technique that combines the strengt...
Monte Carlo based SSTA serves as the golden standard against alternative SSTA algorithms, but it is seldom used in practice due to its high computation time. In this paper, we acc...
Jason Cong, Karthik Gururaj, Wei Jiang, Bin Liu, K...
: Visualization software for three dimensional digital brain atlases present many challenges in design and implementation. These challenges include the design of an effective human...
Carl Gustafson, Oleh J. Tretiak, Louise Bertrand, ...