Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
ld is a prototype IR user interface. It implements visualizations of an abstract information space – fulltext. The presentation demonstrates a visual user interface for the prob...
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Due to the increasing penetration of mobile phones even in poor communities, mobile-phone-enabled banking (m-banking) services are being increasingly targeted at the "unbanked...
Data-parallel accelerator devices such as Graphical Processing Units (GPUs) are providing dramatic performance improvements over even multicore CPUs for lattice-oriented applicatio...