We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
We present an application of arti cial neural networks to machine condition monitoring. Since several signal preprocessing methods produce high dimensional feature vectors there i...
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...