Electronic visual prostheses, or "bionic eyes," are likely to provide some coarse visual sensations to blind patients who have these systems implanted. The quality of art...
Justin R. Boyle, Anthony J. Maeder, Wageeh W. Bole...
Network programming is notoriously hard to understand: one has to deal with a variety of protocols (IP, ICMP, UDP, TCP etc), concurrency, packet loss, host failure, timeouts, the c...
In order to understand and enhance the value of new media in education it is necessary to develop criteria for the evaluation of the effectiveness of learning with hypermedia envi...
Computers have changed the way we live, work, and even recreate. Now, they are transforming how we think about and treat human disease. In particular, advanced techniques in biome...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...