—The blogosphere can be construed as a knowledge network made of bloggers who are interacting through a social network to share, exchange or produce information. We claim that th...
We present an indoor wireless localization system that is capable of room-level localization based solely on 802.11 network signal strengths and usersupplied training data. Our sys...
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...