When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on ...
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
We present an application of interactive global illumination and spatially augmented reality to architectural daylight modeling that allows designers to explore alternative design...
Yu Sheng, Theodore C. Yapo, Christopher Young, Bar...
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
The programmable network approach allows processing of passing user data in a network, which is highly suitable especially for multimedia streams processing. However, programming ...