Background: Microarray technology provides an efficient means for globally exploring physiological processes governed by the coordinated expression of multiple genes. However, ide...
Abstract. As mobility permeates into todays computing and communication arena, we envision application infrastructures that will increasingly rely on mobile technologies. Tradition...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
In this paper we introduce the architecture of a distributed service platform that integrates speech, web technology and voice-overIP technologies and describe how a specific serv...
Michael Pucher, Julia Tertyshnaya, Florian Wegsche...