Disaster prevention and management is a complicated task that often involves a tremendous volume of heterogeneous data from various resources. With its dynamic and distributed nat...
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
We investigate relationships among software quality measures commonly used to assess the value of a technology, and several aspects of customer perceived quality measured by Inter...
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
This paper offers an exploration of the attitudes of older adults to keeping in touch with people who are important to them. We present findings from three focus groups with peopl...