Despite many sensor, hardware, networking, and software advances, it is still quite difficult to build effective and reliable context-aware applications. We propose to build a con...
Context–Aware Composition is a technique to overcome the complexity of wireless discovery, device selection, and establishing connections to other computers in an environment wh...
Kent Lyons, Roy Want, David Munday, Jiasheng He, S...
E-learning is fueling efforts to integrate distributed learning systems in organisations. This paper provides a case study of integrated work and learning processes in a customer ...
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
The convergence of the Internet and ubiquitous technologies offers an unprecedented level of convenience for information collection, accessing, and sharing through mobile devices ...