The Web has been recognized as an important part of our cultural heritage. Many nations started archiving national web spaces for future generations. A key technology for data acqu...
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Drum controllers designed by researchers and commercial companies use a variety of techniques for capturing percussive gestures. It is challenging to obtain both quick response ti...
Adam R. Tindale, Ajay Kapur, George Tzanetakis, Pe...
Abstract. As a window into the subject, we recount some of the history (and geography) of two mature, challenging, partially open, partially closed problems in the theory of rewrit...
Abstract. With the emerging mass production of very small, cheap Radio Frequency Identification (RFID) tags, it is becoming feasible to deploy such tags on a large scale. In this ...