This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
In this paper, from the viewpoint of scene understanding, a 3-layer Bayesian hierarchical framework (BHF) is proposed for robust vacant parking space detection. In practice, the ch...
Visualization is a powerful tool for analysing data and presenting results in science, engineering and medicine. This paper reviews ways in which it can be used in distributed and...
Ken Brodlie, David A. Duce, Julian R. Gallop, J. P...