Research has shown that computers are notoriously bad at supporting the management of parallel activities and interruptions, and that mobility increases the severity and scope of ...
Jakob E. Bardram, Jonathan Bunde-Pedersen, Mads S&...
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
Result of my literature review shows the important characteristics of three distinct modalities and the factors influencing interaction in a ubiquitous computing context. Research ...
This paper presents the identification, design and implementation of a user interface to a brokerage system and the conceptual architecture and functional behaviour of an intellig...
Panayiotis Koutsabasis, John Darzentas, Thomas Spy...
: Large amounts of protein and domain interaction data are being produced by experimental high-throughput techniques and computational approaches. To gain insight into the value of...
Andreas Schlicker, Carola Huthmacher, Fidel Ram&ia...