The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
The MobileASL project aims to increase accessibility by enabling Deaf people to communicate over video cell phones in their native language, American Sign Language (ASL). Real-tim...
Neva Cherniavsky, Anna Cavender, Richard E. Ladner...
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...