In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Mobile phones are becoming the convergent platform for personal sensing, computing, and communication. This paper attempts to exploit this convergence towards the problem of autom...
Chuan Qin, Xuan Bao, Romit Roy Choudhury, Srihari ...
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
We present the results of a qualitative study of the sharing and consumption of entertainment media on low-cost mobile phones in urban India, a practice which has evolved into a v...
Thomas N. Smyth, Satish Kumar, Indrani Medhi, Kent...
This paper proposes an effective approach to provide relevant search terms for conceptual Web search. ‘Semantic Term Suggestion’ function has been included so that users can f...