People routinely rely on physical and electronic systems to remind themselves of details regarding personal and organizational contacts. These systems include rolodexes, directori...
Jonathan Trevor, David M. Hilbert, Daniel Billsus,...
This paper describes two systems to recover the Internet connectivity impaired by private networks and firewalls. These devices cause asymmetry in the Internet, making peer-to-pee...
1 In the complexity and simulation communities there is growing support for the use of bottom-up computer-based simulation in the analysis of complex systems. The presumption is th...
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
In general, the iris recognition systems have used the wavelet transform as feature extraction techniques. Since the wavelet transform does not have the shift-invariant property, t...
Seung-In Noh, Kwanghyuk Bae, Yeunggyu Park, Jaihie...