In this paper, we apply the theory of task technology fit to mobile technology, focusing specifi-cally on the role of user mobility. We describe the results of an empirical study ...
The study of synchronization has received much attention in a variety of applications, ranging from coordinating sensors in wireless networks to models of fireflies flashing in...
Humans can easily recognize complex objects even if values of their attributes are imprecise and often inconsistent. It is not clear how the brain processes uncertain visual inform...
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
In this paper we discuss a real world problem encountered during recent fieldwork: that of providing information in public settings when the information has both public and privat...