Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
We examine opportunities for ubiquitous technologies in retail shopping, jewelry shopping in this case, to supplement the unique information needs inherent to physical trials of t...
Maurice Chu, Brinda Dalal, Alan Walendowski, Bo Be...
The Linguistic Data Consortium (LDC) is currently involved in a major effort to expand its multilingual text resources, in particular for machine translation, message understandin...
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...
—This paper exploits the use of location information of wireless terminals to improve the performance of a beamforming system and support multiple access. Based on a system provi...
Congzheng Han, Matthew Webb, Angela Doufexi, Mark ...