Learn More
The computer games industry is now bigger than the film industry. Until recently, technology in games was driven by a desire to achieve real-time, photo-realistic graphics. To a large extent, this has now been achieved. As game developers look for new and innovative technologies to drive games development, AI is coming to the fore. This paper will examine(More)
Underwater Acoustic Networks (UANs) are utilized in many sensitive commercial, scientific and military applications. However, current network protocols have not been designed to defend against security attacks that can block or degrade network communication and performance. Geographic routing is an essential service used in UANs and current protocols are(More)
Courses within this major can provide foundations applicable to the many fields of engineering, physical sciences, life sciences, behavioral and social sciences, and computer science. Undergraduate majors have considerable freedom to plan a course of study consistent with their particular interests. The professional degree (M.C.A.M.), for persons interested(More)
Software update messages are commonly used to inform users about software updates, recent bug fixes, and various system vulnerabilities, and to suggest recommended actions (e.g., updating software). While various design features (e.g., update options, message layout, update message presentation) of these messages can influence the actions taken by users, no(More)
Modern cloud-based applications (e.g., Face book, Dropbox) serve a wide range of edge clients (e.g., laptops, smart phones). The clients' characteristics vary significantly in terms of hardware (e.g., high end desktop vs. resource constrained smart phones), operating systems (e.g., Linux, Android, Mac OS, Windows), network connections (e.g., wireless vs.(More)
The benefits of the object-oriented paradigm are widely cited. At the same time, inspection is deemed to be the most cost-effective means of detecting defects in software products. Why then, is there no published experience, let alone quantitative data, on the application of inspection to object-oriented systems? We describe the facilities of the(More)