Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
We present a system to retrieve all clips from a meeting archive that show a particular individual speaking, using a single face or voice sample as the query. The system incorpora...
We describe StartMobile, a prototype system that enables users of cellular telephones and other mobile devices to access information, create information and execute commands on th...
Boris Katz, Gary C. Borchardt, Sue Felshin, Federi...
Numerical homotopy continuation gives a powerful tool for the applied scientist who seeks solutions to a system of polynomial equations. Techniques from numerical homotopy continu...
The Common Instrument Middleware Architecture (CIMA) is being used as a core component of a portal based remote instrument access system being developed as an Australian e-Science...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...