This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
In the paper, a cross-layer optimization between application layer and fabric layer is proposed. The aim is to optimize the end-to-end quality of the dynamic grid application as we...
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
The tangential neurons in the lobula plate region of the flies are known to respond to visual motion across broad receptive fields in visual space. When intracellular recordings ar...
Patrick A. Shoemaker, David C. O'Carroll, A. D. St...