Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
It is well established that bitmap indices are efficient for read-only attributes with low attribute cardinalities. For an attribute with a high cardinality, the size of the bitma...
The scarcity and large fluctuations of link bandwidth in wireless networks have motivated the development of adaptive multimedia services in mobile communication networks, where i...
This paper introduces AORTA, a software architecture that provides object-level coordination and shared workspace awareness support to synchronous and distributed collaborative app...
The interdisciplinary project uses a variety of research designs, data collection methodologies, and analysis techniques and two ballot designs to assess five commercially availab...
Paul S. Herrnson, Richard G. Niemi, Benjamin B. Be...