Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
The paper introduces a notion of collaborative teleradiology as a novel organisation of information exchange during a remote radiological consultation. A general interaction patter...
Krzysztof Zielinski, Jacek Cala, Lukasz Czekierda,...
—Fitts’ law is a fundamental tool in measuring the capacity of the human motor system. It measures information throughput in terms of the tradeoff between the speed and accurac...