In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
The challenges of wireless and mobile computing environments have attracted the attention of researchers to revisit the conventional implementation of distributed computing paradi...
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Mobile IPv6 (MIPv6) and Fast Handover (FHO) have been developed by the Internet Engineering Task Force (IETF) to address the IP mobility issues of roaming mobile devices, and to r...
Using a mobile device in a social context should not cause embarrassment and disruption to the immediate environment. Interaction with mobile and wearable devices needs to be subt...