The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Identification and characterization of indications in eddy current (ET) signals can be highly subjective in nature, with varying diagnoses made by different analysts or by a singl...
Arthur J. Levy, Jane E. Oppenlander, David M. Brud...
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
This paper presents a system that exploits the benefits of modelling multimedia presentations as structured documents within the context of interactive digital television systems....
High-fidelity simulations with intuitive user interfaces expedite real-world tasks. Augmented Reality (AR), enables 3D computer-generated entities to coexist in users' view o...
Seungjun Kim, Nitaigour-Premchand Mahalik, Anind K...