: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
This paper describes our initial efforts to deploy a digital library to support computer-aided collaborative design. At present, this experimental testbed, The Engineering Design ...
The approach for predictive analysis focuses on a business strategy to streamline business-customer relationships in order to maximize client satisfaction and thereby improve cust...
Email has come to play a central role in task management, yet email tool features have remained relatively static in recent years, lagging behind users' evolving practices. T...
Victoria Bellotti, Nicolas Ducheneaut, Mark Howard...