In this paper, we investigate the load balancing problem among a cluster of mobile and fixed devices in a voice enabled interface. We consider a design approach. The voice interfa...
Mustapha Hadim, Pierre Manneback, Michel Bagein, P...
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Mobile learning has a lot of potential for supporting learning in situations such as in a museum, at a tourist sight or when exploring biological phenomena at a riverside. There l...
The importance of individual characteristics has been emphasized in the human computer interaction and information visualization (IV) literature. However, decision style, which is...
Wan Adilah Wan Adnan, Nor Laila Md. Noor, Rasimah ...
In practical system identification, process optimization and controller design, it is often desirable to simultaneously handle several objectives and constraints. In some cases, t...