It is getting harder to extract useful information from the enormous amount of data that is being collected in the medical information systems or eHealth systems due to the distri...
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
The goal of the One Laptop Per Child program is “to provide children around the world with new opportunities to explore, experiment, and express themselves.” To stay true to t...
Most recent graphics courses are what we would call topdown courses. Courses that focus on using graphical packages to implement and teach graphics. The course discussed in this p...
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
Educational gaming is an exciting genre of computer programming that attempts to find interesting and compelling ways to teach while also being fun. Research has been conducted to...
Patrick Clements, Jeremy Pesner, Jeremiah Shepherd
In this paper we introduce G-expressions, a new syntax based on the S-expression syntax utilized by most Lisp family languages. We have implemented a new homoiconic language, Ging...
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
An algorithm is proposed for the purpose of optimizing the availability of files to an operating system prior to their being required during execution by a running system. This al...