— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contamin...
We performed several experiments using a Personal Digital Assistant (PDA) as an input device in the nondominant hand along with a mouse in the dominant hand. A PDA is a small hand...
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Illumination change is one of most important and difficult problems which prevent from applying face recognition to real applications. For solving this, we propose a method to comp...