This paper describes a novel solution to problems associated with interactive display of immersive stereographic imagery via Apple’s QuickTime Virtual Reality (QTVR) technology....
N. A. Bolhassan, William L. Martens, Michael M. Co...
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
This presentation will focus primarily on work being done at Indiana University in the area of digital music libraries, with some discussion of related efforts. Indiana University...
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
In this paper we present a simple and general new No Free Lunch-like result that applies to revisiting algorithms searching arbitrary problem sets. We begin by unifying the assumpt...