Computers are at the heart of most activities nowadays. A processor is the central component of
a computer, but nowadays, we can find processors embedded in many other components, such as
game consoles, consumer electronic devices and cars, just to mention a few.
This lecture presents a thorough study of the microarchitecture...
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included...
From its beginnings, the Internet has fostered communication, collaboration and
networking between users. However, the first boom at the turn of the millennium
was mainly driven by a rather one-sided interaction: e-commerce, portal sites and
the broadcast models of mainstream media were introduced to theWeb. Over the
last six or seven...
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
This book is the second of two volumes addressing the design challenges associated with new generations of semiconductor technology. The various chapters are compiled from tutorials presented at workshops in recent years by prominent authors from all over the world. Technology, productivity and quality are the main aspects under consideration...
Under mandate of Section 253, Study and Report on
Effectiveness of Air Force Science and Technology
Program Changes, of the Fiscal Year 2002 National
Defense Authorization Act (Public Law 107-107; U.S.
Congress, 2001), the U.S. Air Force contracted with
the National Research Council (NRC) to conduct the
present study. In response,...
When we began creating Unity, we were just three programmers working on
a beautiful little game. There weren't any good game engines that one could
license without putting down wads of cash, so we created our own. We eventually decided that we enjoyed the challenge of making great tools even more than making games, and after some soul...
This volume contains the papers selected for presentation at the 19th International
Symposium on Methodologies for Intelligent Systems—ISMIS 2011, held
in Warsaw, Poland, June 28-30, 2011. The symposium was organized by the
Institute of Computer Science at Warsaw University of Technology. ISMIS is a
conference series that...
This issue consists mainly of a Special Section on “Content Protection and
Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli,
Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed
introduction of these four papers, please refer to the Preface written by
the organizers...
Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material...
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...