The digital revolution has transformed the accumulation of properly curated public research data into an essential upstream resource whose value increases with use.1 The potential...
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
There is a rapidly growing set of applications, referred to as data driven applications, in which analysis of large amounts of data drives the next steps taken by the scientist, e...
Despite the fact that electronic publishing is a common activity to scholars, electronic journals are still based in the print model and do not take full advantage of the faciliti...
The traditional techniques of image capture, scanning, proofing, and separating do not take advantage of colorimetry and spectrophotometry. For critical color-matching application...
Roy S. Berns, Francisco H. Imai, Peter D. Burns, D...