We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
We present a design study highlighting our recent technological developments that will enable the implementation of autonomous wireless sensor networks for home healthcare monitori...
Christine Ho, Michael Mark, Michael Koplow, Lindsa...
The scalability of future massively parallel processing (MPP) systems is being severely challenged by high failure rates. Current hard disk drive (HDD) checkpointing results in ov...
Xiangyu Dong, Naveen Muralimanohar, Norman P. Joup...
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
This paper aims at exploring the role of the product generation life cycle (PGLC) on differences in innovation strategy among industries in a crossindustry study of ten multinatio...