The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to obj...
Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czaj...
Abstract. Current surgical robotic systems in orthopaedics lack realistic pre-operative simulations and utilize invasive methods to register bone intra-operatively. A multidiscipli...
R. V. O'Toole III, David A. Simon, Branislav Jaram...
Mobility is more and more mediated, supported and transformed by technological artefacts and infrastructures. Especially technologies labelled as mobile, pervasive, ubiquitous or ...