The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
This paper describes a series of user-centred design sessions conducted with children of varying ages to explore near-future applications of sensor-based technologies. We explain ...
In an effort to improve our understanding of the way we work, my team grouped together ideas from various sources to come up with an estimation scheme that avoided the confusing n...
This paper defines a new layered architecture for supporting optical burst switching in an optical core network. The architecture takes into account both the control plane as well...
Farid Farahmand, Jason P. Jue, Vinod Vokkarane, Jo...
Intelligent behavior is the selection of actions based on knowledge. The design of the Fuzzy Adaptive Survivability Tool (FAST) agents and their intelligent behavior is explained....