-- Given the overwhelming information appearing in the current web environment, recommendations have been increasingly applied to assist users in handling with the information over...
The push toward voting via hand-marked paper ballots has focused attention on the limitations of current optical scan systems. Discrepancies between human and machine interpretati...
Pingping Xiu, Daniel P. Lopresti, Henry S. Baird, ...
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Abstract--As society's dependence on network technology increases, the need for resilience and survivability in these services becomes increasingly apparent. Since the user ex...
Justin P. Rohrer, Ramya Naidu, James P. G. Sterben...