Monitoring and tracking human activities around restricted areas is an important issue in security and surveillance applications. The movement of different parts of the human body...
M. B. Guldogan, Fredrik Gustafsson, Umut Orguner, ...
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages MicrosoftÒ HealthVault and GoogleÒ Hea...
Nhan V. Do, Rick Barnhill, Kimberly A. Heermann-Do...
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...