People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
— In third generation (3G) cellular networks, base stations are connected to base station controllers by pointto-point (usually T1/E1) links. However, today’s T1/E1 based backh...
We present a new method for the animation and rendering of photorealistic water effects. Our method is designed to produce visually plausible three dimensional effects, for exampl...
Douglas Enright, Stephen R. Marschner, Ronald Fedk...
Abstract Walking, running and hopping are based on self-stabilizing oscillatory activity. In contrast, aiming movements serve to direct a limb to a desired location and demand a qu...