Electronic concept mapping tools empower experts to play an active role in the knowledge capture process, and provide a medium for building richly connected multimedia knowledge m...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
Using content-specific models to guide information retrieval and extraction can provide richer interfaces to endusers for both understanding the context of news events and navigat...
Earl J. Wagner, Jiahui Liu, Larry Birnbaum, Kennet...