Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
The field of multi-robot coordination, specifically robot formation control, is rapidly expanding, with many applications proposed. In our previous work, we considered the problem...
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Understanding collaborative work practices represents a critical factor in and a necessary fundament for the development of effective Computer Supported Collaborative Work (CSCW) ...