Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
Jukola is an interactive MP3 Jukebox device designed to allow a group of people in a public space to democratically choose the music being played. A public display is used to nomi...
Kenton O'Hara, Matthew Lipson, Marcel Jansen, Axel...