The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
Abstract—Software Distributed Shared Memory (SDSM) systems provide programmers with a shared memory programming environment across distributed memory architectures. In contrast t...
—The recently proposed Pocket Switched Network paradigm takes advantage of human social contacts to opportunistically create data paths over time. We examine how effective such a...
Ultrasound (US) is a medical imaging modality which is extremely difficult to learn as it is user-dependent, has low image quality and many artifacts that depend on the viewing d...
Tobias Blum, Sandro Michael Heining, Oliver Kutter...
In recent years, the topic of emotion reading has increasingly received attention from researchers in Cognitive Science and Artificial Intelligence. To study this phenomenon, in th...