An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
— We present a method for fast analysis of signal and power integrity based on a recently developed multilayered finite difference method (M-FDM). In order to accurately model m...
A pervasive virtual instructor is an artificially intelligent instructor that may appear transparent to the learner or appear in the form of a threedimensional graphical character...
We present a design for recapitulating walks through Dublin's City Centre by characters in James Joyce's Ulysses. Our computationally supported walkers will avail themse...
Andrea Taylor, Brendan Donovan, Zoltan Foley-Fishe...