Large collections of documents containing various types of multimedia, are made available to the WWW. Unfortunately, due to the un-structuredness of Internet environments it is ha...
In many systems, sensors are used to acquire information from external environments such as temperature, pressure and locations. Due to continuous changes in these values, and lim...
In this paper, we propose a toolkit, wear-UCAM, which can support mobile user interactions in smart environments through utilizing user's context. With the rapid developments ...
Dongpyo Hong, Youngjung Suh, Ahyoung Choi, Umar Ra...
The increased use of virtual machines in the enterprise environment presents an interesting new set of challenges for the administrators of today's information systems. In ad...
Mark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Vil...
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...