The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
This work presents a new statistical approach to region merging where regions are modeled as arbitrary discrete distributions, directly estimated from the pixel values. Under this...
Whereas previous studies have been primarily focused on the structural features of Information Technology governance, this paper describes an exploratory study of IT governance pr...
Pieter M. A. Ribbers, Ryan Peterson, Marylin M. Pa...
Abstract: The concept of information is still lacking a complete understanding, as witnessed by the large number of different meanings that overload the terms "data", &qu...