More than a process-automating tool, telemedicine is increasingly recognized for its ability to facilitate collaboration and knowledge creation between disparate healthcare provid...
Houghton G. Brown, Marshall Scott Poole, Thomas Le...
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
In this paper we will concentrate on the conceptual modeling and semantics of service delegation and alignment in information systems. In delegation, one typically has the situatio...
Herman Balsters, G. B. Huitema, Nicolae B. Szirbik
Abstract. Laboratory investigations have shown that a formal theory of fault-tolerance will be essential to harness nanoscale self-assembly as a medium of computation. Several rese...
Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...