Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
The traditional view of the “home computer” is as a selfcontained appliance: computation, on this view, is something that takes place within a desktop box, and that produces i...
Michael Eisenberg, Nwanua Elumeze, Leah Buechley, ...
In this paper, we address the problem of maintaining a precise frequency in vibrating motors for use as vibrotactile cueing devices. Our solution utilizes a piezoelectric film sen...
Justin Cohen, Masataka Niwa, Robert W. Lindeman, H...
Any new tool introduced for education needs to be validated. We developed a virtual human experience called the Virtual Objective Structured Clinical Examination (VOSCE). In the V...
Kyle Johnsen, Andrew Raij, Amy O. Stevens, D. Scot...
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...