Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
Many databases have become Web-accessible through form-based search interfaces (i.e., HTML forms) that allow users to specify complex and precise queries to access the underlying ...
Hai He, Weiyi Meng, Yiyao Lu, Clement T. Yu, Zongh...
Multimedia social network is a network infrastructure in which the social network members share multimedia contents with all different purposes. Analyzing user behavior in multime...
The data traffic in wireless networks for the third generation (3G) mobile telecommunication systems should take into account a variety of services (voice, data, video) and envir...
GeneVis provides a visual environment for exploring the dynamics of genetic regulatory networks. At present time, genetic regulation is the focus of intensive research worldwide, ...
Charles A. H. Baker, M. Sheelagh T. Carpendale, Pr...