With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. At the same time we see an increasing need for people to limit their interactions on...
Ibrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, And...
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
The "blogosphere" has been claimed to be a densely interconnected conversation, with bloggers linking to other bloggers, referring to them in their entries, and posting ...
Susan C. Herring, Inna Kouper, John C. Paolillo, L...