Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
Courseware increasingly consists of generic information and communication tools. These offer a plethora of functionalities, but their usefulness to a particular learning community ...
We present an advanced multimedia infrastructure that integrates continuous real-time media streams within the WWW. This new service architecture focuses on advanced facilities fo...
: With the increasing amount of information available on the Internet one of the most challenging tasks is to provide search interfaces that are easy to use without having to learn...
One of the primary goals of undergraduate studies programs is to promote the professional and personal growth and success of their students. First year students, however, often suf...