The implementation of technology and, in particular, eCommerce technologies has had unforeseen consequences for the relationship between managers and employees. To be able to oper...
Yvette Blount, Tanya Castleman, Paula M. C. Swatma...
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Large-scale information processing applications must rapidly search through high volume streams of structured and unstructured textual data to locate useful information. Content-ba...
This paper describes the design and implementation of the user interface for a prototype immersive VRML2 browser, with particular reference to the planning and viewpoint movement ...
A new trend in processor design is increased on-chip support for multithreading in the form of both chip multiprocessors and simultaneous multithreading. Recent research in databa...
John Cieslewicz, Jonathan W. Berry, Bruce Hendrick...