Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
Web 2.0 applications like Flickr, YouTube, or Del.icio.us are increasingly popular online communities for creating, editing and sharing content. However, the rapid increase in siz...
Abstract. In the design of behavior-based control architectures for robots it is common to use biology as inspiration, and often the observed functionalities of insect behaviors ar...
This paper presents a new reliable detection of core and delta in fingerprints by candidate analysis. The line search based method, which is one of the reliable approaches to dete...
In this paper, we describe a conceptual framework and address the related issues and solutions in the identification of three major challenges for the development and evaluation of...
Effie Lai-Chong Law, Michael D. Kickmeier-Rust, Di...