Users’ past search behaviour provides a rich context that an information retrieval system can use to tailor its search results to suit an individual’s or a community’s infor...
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
— Naming and addressing are important issues for Next Generation Internet (NGI). In this paper, we discuss a new Mobility and Multihoming supporting Identifier Locator Split Arch...
Individuals face additional challenges when interacting in virtual teams. The lack of media richness and the asynchronous nature of technologically transmitted messages make commu...
Virtual worlds may be enabling technologies for the next generation of business models, practices and innovations in service. We situate our research within the field of service s...