Some Open Problems in Large Volume Data Mining in Biomedical Applications
Recent advances in sensor technologies have enabled long term recordings of numerous physiologic parameters in patients, generating very large data sets. This phenomena extends to implantable sensors as well as non-invasively applied external sensors. A…
Secure Web Services for Low-cost Devices
Moderately Hard, Memory-bound Functions
Stopping Spam
A Type Discipline for Authorization Policies
Some Things Algorithms Cannot Do
802.11i Security Analysis: Can we build a secure WLAN?
Security has become a serious concern in wireless local area networks. In order to eliminate the vulnerabilities in previous security mechanisms, IEEE Task Group i has designed 802.11i to provide enhanced MAC security in a…
Clustering Algorithms for Perceptual Image Hashing
A perceptual image hash function maps an image to a short binary string based on an image’s appearance to the human eye. Perceptual hashing is useful in image databases, watermarking, and content authentication in adversarial…