This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Traditional database system architectures face a rapidly evolving operating environment, where millions of users store and access terabytes of data. In order to cope with increasi...
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Increased concern about bioterrorism and emerging diseases is driving the development of systems for early epidemic detection. These systems have different requirements than tradit...
David L. Buckeridge, Martin J. O'Connor, Haobo Xu,...