Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
A common problem facing mobile computing is disconnected operation, or computing in the absence of a network. Hoarding eases disconnected operation by selecting a subset of the us...
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
: Precise temperature monitoring is the major precondition to supervise quality losses within the transport chain for fresh products. Different types of miniaturised data loggers w...
We describe a minimalist methodology to develop usage-based recommender systems for multimedia digital libraries. A prototype recommender system based on this strategy was impleme...
Johan Bollen, Michael L. Nelson, Gary Geisler, Raq...