Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
Kinesthetic feedback is a key mechanism by which people perceive object properties during their daily tasks – particularly inertial properties. For example, transporting a glass...
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...