Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Object identification via a perceptual-demonstrative mode of presentation has been studied in cognitive science as a particularly direct and context-dependent means of identifying ...
Disk subsystem is known to be a major contributor to overall power consumption of high-end parallel systems. Past research proposed several architectural level techniques to reduc...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, A...
As technology scales down at an exponential rate, leakage power is fast becoming the dominant component of the total power budget. A large share of the total leakage power is diss...
— This paper reports an overview of the navigation and control system design for the new Nereus hybrid underwater robotic vehicle (HROV). Vehicle performance during its first se...
Louis L. Whitcomb, Michael V. Jakuba, James C. Kin...