Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Customer care in technical domains is increasingly based on e-mail communication, allowing for the reproduction of approved solutions. Identifying the customer's problem is o...
Stephan Busemann, Sven Schmeier, Roman Georg Arens
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stage...
Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new ...