The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
We propose a new approach to accessing databases through the Web that is based on the WebDAV protocol (Web-based Distributed Authoring and Versioning). This paper introduces an ex...
Multi-user, touch-sensing input devices create opportunities for the use of cooperative gestures ? multi-user gestural interactions for single display groupware. Cooperative gestu...
Meredith Ringel Morris, Anqi Huang, Andreas Paepck...
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
—A key technology in cooperative communications is distributed space-time coding (DSTC) which achieves spatial diversity gain from multiple relays. A novel DSTC, called randomize...
Pei Liu, Chun Nie, Elza Erkip, Shivendra S. Panwar