Now showing items 1-10 of 77
Rail Surface Measurement And Multi-Scale Modeling Of Wheel-Rail Contact
(Amer Soc Mechanical Engineers, 2016-01-01)
Fast multi-level test generation at the RTL
Functional, at-speed vectors continue to provide added value to the testing community as circuit complexity rises. Complex defects may escape traditional scan vectors and thus often require at-speed patterns. However, ...
Heat transfer model to characterize the focal cooling necessary to suppress spontaneous epileptiform activity
Epilepsy is characterized by paroxysmal transient disturbances of the electrical activity of the brain. Symptoms are manifested as impairment of motor, sensory, or psychic function with or without loss of consciousness or ...
Implementing an IPv6 Moving Target Defense on a Live Network
(Cyber-Physical Systems Virtual Organization, 2012)
The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
Towards Use And Reuse Driven Big Data Management
We propose a use and reuse driven big data management approach that fuses the data repository and data processing capabilities in a co-located, public cloud. It answers to the urgent data management needs from the growing ...
MAKER: An Ethnography of Maker and Hacker Spaces Achieving Diverse Participation
Some have hailed the emergence of maker spaces as an opportunity to broaden participation of underrepresented groups in science, technology, engineering, and math (STEM) education, engaging participants in open, creative, ...
An Architecture for Electronic Textiles
This paper makes a case for a communication architecture for electronic textiles (e-textiles). The properties and re- quirements of e-textile garments are described and analyzed. Based on these properties, the authors make ...
Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid
(ACM Press, 2014)
The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
CrowdLayout: Crowdsourced Design and Evaluation of Biological Network Visualizations
Biologists often perform experiments whose results generate large quantities of data, such as interactions between molecules in a cell, that are best represented as networks (graphs). To visualize these networks and ...
A Longitudinal Study of the Dimensions of Disciplinary Culture to Enhance Innovation and Retention among Engineering Students
The U.S. engineering educational system has been generally slow in developing pedagogies that successfully promote innovative behaviors. Although numerous sources recognize the growing scope and complexity of challenges ...