Abstract. Contemporary workflow management systems offer workitems to users through specific work-lists. Users select the work-items they will perform without having a specific sch...
Ronny Mans, Nick C. Russell, Wil M. P. van der Aal...
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
Although inexpensive, high performance computer graphics hardware has become commonly available, its application in the mobile agent and networking fields has thus far been limite...
Abstract—Model-driven development has become the stateof-the-art approach for designing embedded real-time systems. heir high level of abstraction, models are easier to understan...
Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birk...
Abstract. We propose a new type of input for mobile devices by sensing forces applied by users to device casings. Deformation of the devices is not necessary for such “force gest...