Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Context influences the search process, but to date research has not definitively identified which aspects of context are the most influential for information retrieval, and thus a...
Luanne Freund, Elaine G. Toms, Charles L. A. Clark...
Sampling multisensory information and taking the appropriate motor action is critical for a biological organism’s survival, but a difficult task for robots. We present a Neurally...