There are many benefits to participating in multi-campus collaborations among project-based design teams. First, students gain experience in working in a distributed design environment, which is becoming more commonpl...
详细信息
Explorative research is a vital part of biological sciences. Biologists frequently have to examine and compare multiple (large) sets of biological data in an interactive and explorative manner. Exploring alternative w...
详细信息
In this paper the improvement in the performance obtained by a Time Interleaving applied to DVB-T scheme are analyzed in impulsive noise environments. The performance is evaluated in terms of bit error rate probabilit...
详细信息
Novices face many barriers when learning to program, including the need to learn both a new syntax and a model of computation. By constraining syntax and providing concrete visual representations on which to operate, ...
详细信息
Novices face many barriers when learning to program, including the need to learn both a new syntax and a model of computation. By constraining syntax and providing concrete visual representations on which to operate, direct manipulation programming environments can potentially lower these barriers. However, what if the learning goal of the novice is to be able ultimately to program in conventional textual languages, as is the case for introductory computer science students? Can direct manipulation programming environments lower the barriers to programming, and, at the same time, promote positive transfer to textual programming? To address this question, we designed a new direct manipulation programming interface for ALVIS Live!, a novice programming environment. We then conducted an experimental study that compared the programming outcomes promoted by the new direct manipulation interface to those promoted by ALVIS Live!'s textual programming interface. We found that the direct manipulation interface not only led to significantly better initial programming outcomes, but also to significant positive transfer to the textual interface. Our results show that direct manipulation interfaces can provide novices with a "way in" to traditional textual programming
This work presents the performance of WLAN and MANET networks using the auto-configuration of Mobile IP Agents Protocol (DRMIPA). This scheme would allow groups of MIP nodes in WLANs or MANETs to enjoy IP mobility at ...
详细信息
ISBN:
(纸本)9781424436446
This work presents the performance of WLAN and MANET networks using the auto-configuration of Mobile IP Agents Protocol (DRMIPA). This scheme would allow groups of MIP nodes in WLANs or MANETs to enjoy IP mobility at any foreign or local network that doesn't implement MIP. To maintain a failure free MIP network, a passive agent is elected from an active agent if this active agent leaves or ceases its participation from current network. The DRMIPA protocol is implemented in WLAN and MANET. A performance analysis is done using a real world testbed scenario.
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-vol...
详细信息
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-volatile memory such as hard disks, for many e-commerce and network applications, sensitive information is often stored as plaintext in main memory. Documented and reported exploits facilitate an adversary stealing sensitive information from an application's memory. These exploits include illegitimate memory scan, information theft oriented buffer overflow, invalid pointer manipulation, integer overflow, password stealing Trojans and so forth. Today's computing system and its hardware cannot address these exploits effectively in a coherent way. This paper presents a unified and lightweight solution, called InfoShield that can strengthen application protection against theft of sensitive information such as passwords, encryption keys, and other private data with a minimal performance impact. Unlike prior whole memory encryption and information flow based efforts, InfoShield protects the usage of information. InfoShield ensures that sensitive data are used only as defined by application semantics, preventing misuse of information. Comparing with prior art, InfoShield handles a broader range of information theft scenarios in a unified framework with less overhead. Evaluation using popular network client-server applications shows that InfoShield is sound for practical use and incurs little performance loss because InfoShield only protects absolute, critical sensitive information. Based on the profiling results, only 0.3% of memory accesses and 0.2% of executed codes are affected by InfoShield.
The algorithm of the dynamic control functions achieves a complex modeling regarding the behavior of any mechanical robot structure. First of all, considering the kinetic links dominated of stiffness hypothesis, on th...
详细信息
The algorithm of the dynamic control functions achieves a complex modeling regarding the behavior of any mechanical robot structure. First of all, considering the kinetic links dominated of stiffness hypothesis, on the basis of the new formulations with matrix exponentials, in this paper, the differentials expressions answerable to the forward kinematics of mechanical robot structures were presented. On the basis of these equations, in the following, the generalized dynamics forces were also analyzed for the robots with rigid and elastic structure
Modelica is a modern, strongly typed, declarative, and object-oriented language for modeling and simulation of complex systems. This paper gives a quick overview of some aspects of the OpenModelica environment - an op...
详细信息
Modelica is a modern, strongly typed, declarative, and object-oriented language for modeling and simulation of complex systems. This paper gives a quick overview of some aspects of the OpenModelica environment - an open-source environment for modeling, simulation, and development of Modelica applications. An introduction of the objectives of the environment is given, an overview of the architecture is outlined and a number of examples are illustrated.
T he VPN and SSL were both designed to negotiate telecom-munication security. The VPN is the Virtual Private Network; the SSL is the Secure Socket Layer or, more properly, Transport Layer Security.
T he VPN and SSL were both designed to negotiate telecom-munication security. The VPN is the Virtual Private Network; the SSL is the Secure Socket Layer or, more properly, Transport Layer Security.
Some Lisp programs such as Emacs, but also the Linux kernel (when fully modularised) are mostly dynamic;i.e., apart from a small static core, the significant functionality is dynamically loaded. In this paper, we expl...
详细信息
暂无评论