In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
We consider the problem of how the CNS learns to control dynamics of a mechanical system. By using a paradigm where a subject's hand interacts with a virtual mechanical envir...
Researchersin the biological sciencesrequire access to a variety of information sources locatedin variousplacesondifferent computer networks.In order to satisfy the information ne...
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...