A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
Recent years saw the rapid development of peer-topeer (P2P) networks in a great variety of applications. However, similarity-based k-nearest-neighbor retrieval (k-NN) is still a c...
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...
Vertical IS standards prescribe data structures and definitions, document formats, and business processes for particular industries, in contrast to horizontal IT standards, which ...
Rolf T. Wigand, Charles W. Steinfield, M. Lynne Ma...