We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
— The age of technology has changed the way that surgeons are being trained. Traditional methodologies for training can include lecturing, shadowing, apprenticing, and developing...
A new software tool for user-interface development and assessment of ubiquitous computing applications is available for CHI researchers. The software permits researchers to use co...
Stephen S. Intille, John Rondoni, Chuck Kukla, Isa...
Background: Isotope-coded affinity tags (ICAT) is a method for quantitative proteomics based on differential isotopic labeling, sample digestion and mass spectrometry (MS). The me...
Mario Cannataro, Giovanni Cuda, Marco Gaspari, Ser...
Abstract--This paper describes an interactive tool for constrained clustering that helps users to select effective constraints efficiently during the constrained clustering process...