We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
Traditional Web-based educational systems still have several shortcomings when comparing with a real-life classroom teaching, such as lack of contextual and adaptive support, lack...
As personal assistant software matures and assumes more autonomous control of its users’ activities, it becomes more critical that this software can explain its task processing....
Deborah L. McGuinness, Alyssa Glass, Michael Wolve...
Modern interactive computer games provide the ability to objectively record complex human behavior, offering a variety of interesting challenges to the pattern-recognition communi...
Bernard Gorman, Christian Bauckhage, Christian Thu...
A combinatorial auction mechanism consists of an allocation rule that defines the allocation of goods for each agent, and a payment rule that defines the payment of each winner....
Taiki Todo, Atsushi Iwasaki, Makoto Yokoo, Yuko Sa...