Homeland defense applications will use large-scale ad-hoc networks of small devices. Routing is a crucial problem, for naive means do not scale well. Geographic Routing (GR) (Karp...
David M. Nicol, Michael E. Goldsby, Michael M. Joh...
Abstract: A virtual-machine monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II...
To provide an adequate user interface to the large amount of geometrical and alphanumerical date coupled to the geometries, the 3D interaction in the virtual environment is combin...
This paper introduced the application of a more efficient mathematical representation of the kinematics of avatars, or digital human beings, in telecollaborative virtual reality e...
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...