In this paper, we outline several ways in which the database community can contribute to the development of technology for computer games. We outline the architecture of different...
Walker M. White, Christoph Koch, Nitin Gupta 0003,...
An overview on emerging IP traffic monitoring is presented. Important parameters to characterize the traffic, network and QoS, are discussed. The infrastructure and methodology to ...
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
In order to construct three dimensional shape models of large scale architectures by a laser range finder, a number of range images are normally taken from various viewpoints and...
In Deep Sub-Micron (DSM) technologies, interconnects play a crucial role in the correct functionality and largely impact the performance of complex System-on-Chip (SoC) designs. F...