This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Current visualization tools lack the ability to perform fullrange spatial and temporal analysis on terascale scientific datasets. Two key reasons exist for this shortcoming: I/O ...
Wesley Kendall, Markus Glatter, Jian Huang, Tom Pe...
We present an application for accessing and creating socially constructed sets of information. Users store and retrieve information, such as bits of text, through the use of "...