Abstract--Mobile phones are increasingly able to read autoid labels, such as barcodes or RFID tags. As virtually all consumer products sold today are equipped with such a label, th...
Current research in the area of manufacturing planning and control has moved away from traditional centralized solutions towards distributed architectures that range from hierarch...
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
DBMT is researched here in the context of future systems for the general public, where a monolingual author wants to translate into several languages. We have produced a complete ...
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...