This paper presents a photo browsing system on mobile devices to browse and search photos efficiently by tilting action. It employs tilt dynamics and multi-scale photo screen layo...
Sung-Jung Cho, Roderick Murray-Smith, Yeun-Bae Kim
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...