Workflow management systems (WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can ca...
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
We updated the plant transcription factor (TF) database to version 2.0 (PlantTFDB 2.0, http:// planttfdb.cbi.pku.edu.cn) which contains 53 319 putative TFs predicted from 49 speci...
He Zhang, Jinpu Jin, Liang Tang, Yi Zhao, Xiaochen...
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...