Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Abstract. Several models have been proposed for spatio-temporal selforganization, among which the TOM model by Wiemer [1] is particularly promising. In this paper, we propose to ad...
Background: Mixture models of mutagenetic trees are evolutionary models that capture several pathways of ordered accumulation of genetic events observed in different subsets of pa...