Interfaces to library systems have largely failed to represent the inherently collaborative nature of information work. This paper describes how collaborative functionality is bein...
David M. Nichols, Duncan Pemberton, Salah Dalhoumi...
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering ope...
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Abstract. Traceability from requirements to code is mandated by numerous software development standards. These standards, however, are not explicit about the appropriate level of q...
The proposed paper analyses the changes in business models employed by the stakeholders in the newspaper value network, in the context of a new type of electronic reading device
Leo Van Audenhove, Simon Delaere, Pieter Ballon, M...