The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
Simulation modelers have a diversity of educational backgrounds including several engineering and scientific disciplines, mathematics and computer related fields. Many of the skil...
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Current visualization systems are typically based on the concept of interactive post-processing. This decoupling of data visualization from the process of data generation offers a...
Context management in pervasive computing environments must reflect the specific characteristics of these environments, e.g. distribution, mobility, resource-constrained devices, o...
Roland Reichle, Michael Wagner, Mohammad Ullah Kha...