Current scientific workflow models require datasets to be transferred from their source to the hosts where they can be processed. This seriously impedes data-intensive application...
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
This paper presents a rate control algorithm for the dominant discrete cosine transform (DCT) -based video coding. It is developed based on a more accurate rate-distortion (RD) mo...
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...