We present a web-based environment for the Automated Dental Identification System (ADIS). This system is designed for identification missing, unidentified and wanted persons based...
Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Jai-Said, ...
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
Abstract. In many large engineering design organizations the information systems have developed over time into a set of heterogeneous resources. This makes it difficult for enginee...
Gary Wills, David W. Fowler, Derek H. Sleeman, Ric...
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...