Internet users are often victimized by malicious attackers. Some attackers infect and use innocent users’ machines to launch large‐scale attacks without the users’ knowledge. One…
The increasing traffic volume and new requirements of highly scalable and efficient distribution of contents exceed the capabilities of the current Internet architecture. Information centric…
The rise of digital photography and imaging has transformed the landscape of visual communication and culture. Events, activities, moments, objects, and people are ‘captured’ and…
Many people in the West or global North now live in a culture of 24/7 instant messaging, iPods and MP3s, streamed content, blogs, ubiquitous digital…
Converging evidence supports the “nonmonotonic plasticity” hypothesis, which states that although complete retrieval may strengthen memories, partial retrieval weakens them. Yet, the classic experimental paradigms…
Predictive resource allocation (PRA) has gained momentum in the network research community as a way to cope with the exponential increase in video traffic. Existing…
Optical tracking is a commonly used tool in computer assisted surgery and surgical training; however, many current generation commercially available tracking systems are prohibitively large…
As evidenced by the clientele in any urban coffee shop, devices such as cell phones, BlackBerries, and Wi-Fi-enabled laptops have proliferated, particularly during the past…
How well can a cryptocurrency serve as a means of payment? We study the optimal design of cryptocurrencies and assess quantitatively how well such currencies…
As a medium, film is constantly evolving both in form and in content. Fluid Screens, Expanded Cinema (with Janine Marchessault), considers the shift from traditional cinema…