In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
This paper describes the structured ASIC technology and impacts to the implementation flow. With an optimized and programmable structure, the structured ASIC technology indeed int...
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
This paper describes work within the NIST Text REtrieval Conference (TREC) over the last three years in designing and implementing evaluations of Spoken Document Retrieval (SDR) t...
John S. Garofolo, Cedric G. P. Auzanne, Ellen M. V...
P-Jigsaw is an extension of W3C's Jigsaw Web-server implementing a cache management strategy for replacement and pre-fetching based on association rules mining from the acces...