In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
āRegular expression matching has become a critical yet challenging technique in content-aware network processing, such as application identification and deep inspection. To meet ...
In floating-point datapaths synthesized on FPGAs, the shifters that perform mantissa alignment and normalization consume a disproportionate number of LUTs. Shifters are implemente...
Yehdhih Ould Mohammed Moctar, Nithin George, Hadi ...
Indoor localization is of great importance for a range of pervasive applications, attracting many research eļ¬orts in the past decades. Most radio-based solutions require a proce...
āSocial media networks contain both content and context-speciļ¬c information. Most existing methods work with either of the two for the purpose of multimedia mining and retrieva...
Guo-Jun Qi, Charu C. Aggarwal, Qi Tian, Heng Ji, T...