This paper proposes an investigation of sociotechnical factors affecting the adoption of information technology (IT) by General Practitioners (GPs), for the purposes of the develo...
Stephen Burgess, Paul Darbyshire, Carmine Sellino,...
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Data replication permits a better network bandwidth utilization and minimizes the effect of latency in large-scale systems such as computing grids. However, the cost of maintainin...
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
This paper describes a method of generating a Kanji hierarchical structured dictionary for stroke-number and stroke-order free handwriting recognition based on substroke HMM. In s...