Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
This paper describes a new control system interface which utilises the user’s eye gaze to enable severely disabled individuals control electronic devices easily. The system is ba...
Abstract. In this article, the performance and capacity gain achievable with quality of service (QoS) management in packet switched radio networks based on the General Packet Radio...
Abstract Text documents usually embody visually oriented meta-information in the form of complex visual structures, such as tables. The semantics involved in such objects result in...