A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
The paper reports on the evaluation of a rapid usability kick-off technique (RUKO). Ten mobile service development projects in the company applied the technique during the early a...
Nina Khalayli, Silja Nyhus, Kari Hamnes, Tone Teru...
In this paper we present a model-based approach to integrate dynamic and volatile functionality in Web Applications. Our approach comprises an extension to the OOHDM design method...
Gustavo Rossi, Andres Nieto, Luciano Mengoni, Nahu...