Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
The problems of producing a software system to assist in the rehabilitation of people who have suffered serious traumatic brain injuries are described. In addition to this primary...
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
This paper describes the process planning techniques we developed for use in an Integrated Product and Process Design (IPPD) tool for the design and manufacture of microwave trans...
Dana S. Nau, Michael O. Ball, John S. Baras, Abdur...