The study follows action science approach to the problem of nonprofit housing services. After 4 months of action sciencebased activities, such as organized participant observation...
Abstract. Active mathematical documents are distinguished from traditional paper-oriented ones by their ability to interactively adapt to a reader’s inputs. This includes changes...
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
One trend in software development is to implement application functionalities through Web services. This eases the possibility of developing interactive applications exploiting fu...
This paper addresses two questions. Firstly, how is it possible for an application to become aware of network conditions and secondly, given this awareness, how can a system be de...
Kristoffer Getchell, Martin Bateman, Colin Allison...