Keeping students alert and responsive during lectures is a challenge even for experienced teachers in small group settings. Research has shown the importance of student participat...
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
This study investigated cross-modal links in attention between haptics and vision. A visual change-detection task was used as a measure of visual attention. Haptic taps on the bac...
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...