Abstract. In various fields of computer science, rapidly growing hardware power, such as high-speed network, high-performance CPU, huge disk capacity, and large memory space, has ...
Katsuro Inoue, Pankaj K. Garg, Hajimu Iida, Ken-ic...
In this paper, we present a novel approach to the congestion control and resource allocation problem of elastic and real-time traffic in telecommunication networks. With the concep...
This paper examines the way in which a knowledge management system (KMS)—by which we mean the people, processes and software—came into being and evolved in response to a varie...
Christine Halverson, Thomas Erickson, Mark S. Acke...
An analysis of context-aware user interfaces shows that adaptation mechanisms have a cost-benefit trade-off for usability. Unpredictable autonomous interface adaptations can easil...
Tim F. Paymans, Jasper Lindenberg, Mark A. Neerinc...
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...