Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
It is well known that utterances convey a great deal of information about the speaker in addition to their semantic content. One such type of information consists of cues to the s...
This paper presents our experience towards the conception of a virtual reality medical simulator coupled with haptic interaction aimed at training surgeons. This area of research h...
Background: Extensive and automated data integration in bioinformatics facilitates the construction of large, complex biological networks. However, the challenge lies in the inter...