Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
With recent advances in battery capacity and the development of hydrogen fuel cells, autonomous underwater vehicles (AUVs) are being used to undertake longer missions that were pre...
L. Stutters, Honghai Liu, C. Tiltman, David J. Bro...
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
The selection of users for participation in IT projects involves trade-offs between multiple criteria, one of which is selecting a representative cross-section of users. This crite...
Rasmus Rasmussen, Anders S. Christensen, Tobias Fj...