Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
In this paper we reflect on our experiences in developing PANORAMA, a playful application meant to promote and support social awareness in a work environment, through art-inspire...
Informative art is computer augmented, or amplified, works of art that not only are aesthetical objects but also information displays, in as much as they dynamically reflect infor...
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
−The ability for software agents to discover, query, and task ubiquitous sensors requires machineinterpretable service descriptions, such as those proposed by the Semantic Web ef...
J. Caleb Goodwin, David J. Russomanno, Joseph Qual...