Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
Peer Assessment (or Peer Review) is a popular form of reciprocal assessment where students produce feedback, or grades, for each others work. Peer Assessment activities can be ext...
David E. Millard, Karen Fill, Lester Gilbert, Yvon...
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...