We present the design and implementation of a working system that enables self-configuration and self-optimization in mobile ad hoc networks (MANETs) by exploiting context awarene...
Apostolos Malatras, George Pavlou, Stylianos Gouve...
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
E-learning is fueling efforts to integrate distributed learning systems in organisations. This paper provides a case study of integrated work and learning processes in a customer ...
Context-aware applications are applications that implicitly take their context of use into account by adapting to changes in a user's activities and environments. No one has ...
Anind K. Dey, Raffay Hamid, Chris Beckmann, Ian Li...
Context awareness has emerged as an important element in distributed computing. It offers mechanisms that allow applications to be aware of their environment and enable these appl...
Luiz Olavo Bonino da Silva Santos, Remco Poortinga...