Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
A personal lifelog of visual and audio information can be very helpful as a human memory augmentation tool. The SenseCam, a passive wearable camera, used in conjunction with an iR...
Aiden R. Doherty, Alan F. Smeaton, Keansub Lee, Da...
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
Abstract: Interdisciplinary research projects with environmental focus need an information technology which is capable of describing the flow of minerals and other substances with ...