This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
— This paper presents non-linear precoding design in closed-loop multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) over spatiallycorrelated,...
In this paper we address the problem of estimating and analyzing the motion in image sequences that involve fluid phenomena. In this context standard motion estimation techniques ...