Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...
Low-level image processing algorithms generally provide noisy features that are far from being Gaussian. Medium-level tasks such as object detection must therefore be robust to out...
Sio-Song Ieng, Jean-Philippe Tarel, Pierre Charbon...
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
We describe a case study that uses grid computing techniques to support the collaborative learning of high school students investigating cosmic rays. Students gather and upload sc...
Marjorie Bardeen, Eric Gilbert, Thomas Jordan, Pau...