One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
There are a number of established products on the market for wrapping—semi-automatic navigation and extraction of data—from web pages. These solutions make use of the inherent...
— This paper deals with audio–video transmission over IP networks and proposes a method of estimating perceptual QoS (i.e., user–level QoS) in real time in terms of the inter...
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Now that we have end-user programming environments capable of empowering kids with no programming background to build games in a matter of hours, a new quest for raising the ceili...