Systems combining the real and the virtual are becoming more and more prevalent. The Augmented Reality (AR) paradigm illustrates this trend. In comparison with traditional interact...
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
We discuss the properties of force-feedback haptic simulation systems that fundamentally limit the re-creation of periodic gratings, and hence, of any texture. These include sampl...
— Retroactivity is a parasitic phenomenon that changes the desired input/output response of a system when it is connected to “downstream” systems. Downstream and upstream ref...