Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Much of the support for communication across distributed communities has focused on meetings and intentional contact. However, most interactions within co-located groups occur whe...
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...