Our demonstration is a paper-based interactive guide for visitors to the world's largest international arts festival that was developed as part of a project investigating new...
Beat Signer, Moira C. Norrie, Michael Grossniklaus...
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Performance is an important quality attribute that needs to be and managed proactively. Abstract models of the system are not very useful if they do not produce reasonably accurat...
Gopalakrishna Raghavan, Ari Salomaki, Raimondas Le...