This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
The ability to record and account for the usage of computational resources in a standardised way across different systems from multiple administrative domains is a precursor to wi...
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
This case study paper reports on the development and implementation of DISXPERT, a rule-based expert system tool for referral of social security disability recipients to vocationa...