Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
This paper describes a portlet-based portal that provides user interfaces for access a Grid-based elearning platform. E-learning platforms that exploit resources and computing pow...
Felicia Ionescu, Cristina Elena Stoica, Mircea Dea...
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Research activity on the Portuguese language for speech synthesis and recognition has suffered from a considerable lack of human and material resources. This has raised some obsta...
Auto ID systems can replace time-consuming, costly and error-prone processes of human data entry and produce detailed real time information. However, they will add value only to t...
Elfriede Krauth, Jos van Hillegersberg, Steef L. v...