Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 20...
The under-representation of women in computer and information science (CIS) has created a crisis in availability of qualified CIS professionals and diversity of perspectives. Many...
Mary Beth Rosson, John M. Carroll, Dejin Zhao, Tim...
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
This paper describes two aspects of the application of tactile information presentation in the cockpit. The first half of the paper discusses why the tactile channel might be used...