Many traditional techniques for “looking inside” volumetric data involve removing portions of the data, for example using various cutting tools, to reveal the interior. This a...
Michael J. McGuffin, Liviu Tancau, Ravin Balakrish...
Abstract. Ubiquitous computing research have extended traditional environments in the so–called Intelligent Environments. All of them use their capabilities for pursuing their in...
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
Abstract—With increasing popularity of media enabled handhelds, the need for high data-rate services for mobile users is evident. Large-scale Wireless LANs (WLANs) can provide su...
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...