Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
A recommender system has an obvious appeal in an environment where the amount of on-line information vastly outstrips any individual’s capability to survey. Music recommendation...
Mobile commerce (m-Commerce), which allows for anytime/anywhere access to information and services, shows great potential. Ubiquitous access to information systems is critical to e...
In this paper, we describe the YeTi information sharing system that has been designed to foster community building through informal digital content sharing. The YeTi system is a g...
Toshiya Yamada, Jun Shingu, Elizabeth F. Churchill...
Different switching techniques have been proposed to design optical switch architectures. Wave Division Multiplexing (WDM) techniques were extensively investigated to implement sw...
Driss Benhaddou, Ala I. Al-Fuqaha, Ghulam Chaudhry