In this paper we present a conceptual view on the incorporation of cognitive processing capabilities in future generation computer systems. We argue that cognition is at the heart...
Arjan J. H. Peddemors, Ignas G. Niemegeers, Henk E...
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
Abstract. Context-aware computing involves the automatic tailoring of information and services based on the current location of the user. In this paper, we describe our experience ...
Tamer Nadeem, Adel M. Youssef, Suman Banerjee, Mou...
Financial modeling represents a promising industry application of high performance computing. In previous work, parallel stock option pricing models were developed for the Connect...
Limitations of state-of-the-art teleoperation systems can be compensated by using shared-control teleoperation architectures that provide haptic assistance to the human operator. T...