PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Abstract-- The rapid advances in a wide range of wireless access technologies along with the efficient use of smart spaces have already set the stage for development of smart homes...
Abhishek Roy, Soumya K. Das Bhaumik, Amiya Bhattac...
We introduce CCASH (Cost-Conscious Annotation Supervised by Humans), an extensible web application framework for cost-efficient annotation. CCASH provides a framework in which cos...
Paul Felt, Owen Merkling, Marc Carmen, Eric K. Rin...
This paper intends to present the challenges and opportunities encountered in technology training at small institutions using Trinity University as a case in point. During the cou...
This paper describes an ongoing technology investigation to assess the value and utility of social bookmarking on a corporate intranet. We hypothesize that social bookmarking woul...
Laurie E. Damianos, Donna L. Cuomo, John Griffith,...