Data lineage and data provenance are key to the management of scientific data. Not knowing the exact provenance and processing pipeline used to produce a derived data set often re...
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Chemically Assembled Electronic Nanotechnology is a promising alternative to CMOS fabrication. In particular, the nanoFabric has proven to be a viable solution for implementing di...
—A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this. Howeve...
Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi...