Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
: Proactive computing reinforces the need for non-command interfaces that fulfill the user’s intentions without explicit commands. Eye gaze is a natural modality to be used in th...
Web services are often employed to create wide distributed evolvable applications from existing components that constitute a service-based software system. ServiceOriented Archite...
Abstract-In this paper we present a new scheme for brain imaginary movement invovles sophisticated spatial-temporalsignal processing and classification for electroencephalogram spe...