Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
Abstract: If the computational demands of an interactive graphics rendering application cannot be met by a single commodity Graphics Processing Unit (GPU), multiple graphics accele...
Ross Brennan, Michael Manzke, Keith O'Conor, John ...
This paper describes a hybrid methodology to study users in ongoing relationships based on three levels of user data analysis. Most user-centered design methods are ideal for the a...
The intrinsic motivation to play, and therefore to learn, that might be provided by digital educational games teases researchers and developers. However, existing educational games...
Michael D. Kickmeier-Rust, Neil Peirce, Owen Conla...
In distributed combinatorial optimization problems, dynamic programming algorithms like DPOP ([Petcu and Faltings, 2005]) require only a linear number of messages, thus generating...