In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
In this paper, we present an online citation entry clustering system based on three-tier clustering. The objective is to further process search results returned by bibliography dat...
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
We present a real-time stereoscopic video-see-through augmented reality (AR) system applied to the medical procedure known as ultrasound-guided needle biopsy of the breast. The AR...
Andrei State, Mark A. Livingston, William F. Garre...