Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Divisible load applications consist of a load, that is input data and associated computation, that can be divided arbitrarily into independent pieces. Such applications arise in m...
This paper reports on extensions to a decision-theoretic location-aware shopping guide and on the results of user studies that have accompanied its development. On the basis of the...
Thorsten Bohnenberger, Oliver Jacobs, Anthony Jame...
We present SAMMIE, a laboratory demonstrator of an in-car showcase of a multimodal dialogue system developed in the TALK project5 in cooperation between DFKI/USAAR/BOSCH/BMW, to s...