Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental ...
Two of the most important research subjects during the development of intelligent authoring systems (IAS) for education are the modeling of knowledge and the extraction of knowledg...
Rough set theory has been considered as a useful tool to deal with inexact, uncertain, or vague knowledge. However, in real-world, most of information systems are based on dominanc...