Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
User Interfaces for Mobile Processes Sonja Zaplata, Ante Vilenica, Dirk Bade, Christian P. Kunze Distributed Systems and Information Systems, Computer Science Department, Universit...
Sonja Zaplata, Ante Vilenica, Dirk Bade, Christian...
This paper describes the design goals and current status of tidier, a software tool that tidies Erlang source code, making it cleaner, simpler, and often also more efficient. In ...