■ Neuroaesthetics is gaining momentum. At this early juncture, it is worth taking stock of where the field is and what lies ahead. Here, I review writings that fall under the ru...
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
: Performance is critical to the success of today’s software systems. However, many software products fail to meet their performance objectives when they are initially constructe...
This paper describes and exercises a new design paradigm for cast components. The methodology integrates foundry process simulation, non-destructive evaluation (nde), stress analys...