Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
The authors present an approach for implementing a system for the assessment of medical competences using a haptic simulation device. Based on Competence based Knowledge Space Theo...
Cord Hockemeyer, Alexander Nussbaumer, Erik Lö...
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
Granular computing is not only a computing model for computer-centered problem solving, but also a thinking model for human-centered problem solving. Some authors have presented t...