In 2005, a major collaboration in Melbourne Australia successfully completed implementing a major medical informatics infrastructure – this is now being used for discovery resear...
Marienne Hibbert, Peter Gibbs, Terence O'brien, Pe...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
— High-speed Internet access in subway and railway systems has been receiving more and more attention in recent years. A critical issue for such application is the ground to trai...
In order to store, and retrieve images from large databases, we propose a framework, based on multiple description coding paradigm, that disseminates images over distributed serve...