Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
A mobile agent is a software agent that has the ability to transfer its program code, data and execution state across a network to a remote computer for execution. In this paper, ...
: In this paper we describe an approach that enables the detection, tracking and fine analysis (classification of gender and facial expression) of faces using a single web camera. ...
Motivation: A few years ago, FlyBase undertook to design a new database schema to store Drosophila data. It would fully integrate genomic sequence and annotation data with bibliog...