Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
This paper describes the functions of a system proposed for the music tube recommendation from social network data base. Such a system enables the automatic collection, evaluation...
Grzegorz Dziczkowski, Lamine Bougueroua, Katarzyna...
Patients do considerable information work. Technologies that help patients manage health information so they can play active roles in their health-care, such as personal health re...
Predrag V. Klasnja, Andrea Civan-Hartzler, Kenton ...
Background: With the advances in DNA sequencer-based technologies, it has become possible to automate several steps of the genotyping process leading to increased throughput. To e...
B. Jayashree, Praveen T. Reddy, Y. Leeladevi, Jona...