In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Ana...
David E. Newman, Nathaniel D. Sizemore, Vickie E. ...
: Automatically recognising which HTML documents on the Web contain items of interest for a user is non-trivial. As a step toward solving this problem, we propose an approach based...
This paper explores the impulsion and vibration properties of different tactile patterns (icons). These properties describe the unique movements of the pins with different values ...
Abstract. Currently knownbasic anonymitytechniques dependon identity verication. If verication of user identities is not possible due to the related management overhead or a gene...
We propose location-mediated service coordination in ubiquitous computing. In the coordination, middle agents determine bestmatched services for a user by considering the user’s...