Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
The information that is made available through the semantic web will be accessed through complex programs (web-services, sensors, etc.) that may interact in sophisticated ways. Com...
Ronny Siebes, David Dupplaw, Spyros Kotoulas, Adri...
This paper describes the design and implementation of the University of Florida’s Anatomic Pathology Database System. The first phase of the system consists of the patient recor...
Changwoo Yoon, James K. Massey, William H. Donnell...
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...