Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
This paper describes our diversity featured retrieval system which are built for the task of ImageCLEFPhoto 2008. Two existing tools are used: Solr and Carrot2 . We have experimen...
Jiayu Tang, Thomas Arni, Mark Sanderson, Paul Clou...
To achieve a smart sensor network with Web-based sensor nodes such as Field Servers, we propose a hierarchical agent system that manages sensor nodes autonomously and flexibly, an...
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
Organizing large document collections for finding information easily and quickly has always been an important user requirement. This paper describes a flexible and powerful dynami...