Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In the past few years there has been a tremendous growth in the usage of digital images. Users can now access millions of photos, a fact that poses the need of having methods that can efficiently and effectively search the visual information of...
How is concrete conceptual information represented in the brain? Little is known about the neural organization for details of concrete objects when presented as words. The goal of the first two studies was to investigate this. In the third study,...
Solar (Computer architecture). ; Ubiquitous computing. Sensor networks. ; Detectors. ; User interfaces (Computer systems).
The complexity of developing context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this dissertation, we present a Context...
Sea ice appears to form an impenetrable boundary at the ocean-atmosphere interface in polar regions, yet in fact its porous structure provides critical pathways for the exchange of heat, gases, salts, and other chemical species impacting the global...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
Brain -- Localization of functions. Analogy. Frontal lobes. Neuropsychology.
This thesis represents a program of behavioral and brain-based research directed at elucidating the mechanisms of analogical reasoning. The studies that comprise this thesis took convergent experimental approaches to extend knowledge concerning two...
Electronic mail systems -- Security measures. Electronic mail systems -- Social aspects. Trust.
A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...
Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...
Our daily lives are pervaded by sounds, predominantly speech, music, and environmental sounds. We readily recognize and categorize such sounds. Our understanding of how the brain so effortlessly recognizes and categorizes sounds is still...
The studies described within the present dissertation build upon and extend the neuroimaging literature in the domains of imagery and semantic retrieval of perceptual memories. These investigations focus on the range of retrieval experiences--from...
As the ubiquitous complexity of common disease has become apparent, so has the need for novel tools and strategies that can accommodate complex patterns of association. In particular, the analytic challenges posed by the phenomena known as...
Current theories of visual category learning posit a representation of category rules and visual features that critically define those categories that are encoded separately and distributed throughout the cerebral cortex. Neuroimaging and...