—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
Cross-species computer applications have a history of blended science and humor, despite the real potential for improving the canine-human bond. New activities available to humans...
Chadwick A. Wingrave, Jeremy Rose, Todd Langston, ...
The new generation of television viewers is currently being confronted and becoming acquainted with a series of technological developments in the realm of consumer electronics and...
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...