Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Over recent years, sensors have increasingly become used to improve the performance of humans. Popular sensors provide a cost efficient way to gather various inputs ranging from temperature to movements to sound. Today, smartphones are...
With the maturity of mobile technologies, voice biometrics is becoming increasingly popular as a promising alternative to traditional passwords for user authentication on smartphones. Moreover, with the popularity of voice user interface...
Biometric-based authentication is gaining increasing attention for wearables and mobile applications. Meanwhile, the growing adoption of sensors in wearables and mobiles also provides opportunities to capture novel biometrics. In this...
The need for expedient detection of and response to signals of danger compels the development of sophisticated neural circuits for threat processing. This threat neural circuitry should support not only identification of and response to...
Neuromodulation plays important roles in adjusting our nervous system to produce behaviors. The same neuromodulator could have different effects on different targets, or the same target could be modulated by multiple neuromodulators. In...
Recent surveys have shown that over 6.8 billion mobile phones are in use today where roughly 50% are running the Android Operating System. This large population of devices can be utilized for message-passing interface (MPI) computing....
The current Internet architecture reveals its chronic limitations against the new paradigms of networking. The advancement of technology has changed the network use from communication to content distribution. Unfortunately, the IP-based...
As storage device performance increases, the lifespan of an I/O request becomes throttled more-so by data path traversal than physical disk access. Even though many computer performance analysis tools exist, a surprisingly small amount...
The legacy storage data path is largely structured in black-box layers and has four major limitations: (1) functional redundancies across layers, (2) poor cross-layer coordination and data tracking, (3) presupposition of high-latency...
Malware has crippled computer systems, caused financial losses on the order of billions of dollars and denied access to services for millions of users worldwide. Detecting malware before it can cause any damage, therefore, is a...
Mobile computing is the new norm. As people feel increasingly comfortable computing in public places such as coffee shops and transportation hubs, the threat of exposing sensitive information increases. While solutions exist to guard the...
Anonymous networks play a critical role in supporting free speech and user privacy on the Internet. Over the years, many fundamental algorithms and schemes have been proposed to facilitate the development of anonymous networks, including...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.