Engagement with computer games causes children and adolescent users to spend a substantial amount of time at sedentary game playing activity. We hypothesise that this engagement c...
Shlomo Berkovsky, Dipak Bhandari, Stephen Kimani, ...
Understanding how a single edge deletion can affect the connectivity of a graph amounts to finding the graph bridges. But when faced with d > 1 deletions, can we establish as ...
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
Older people have been the focus of research for ubiquitous computing applications. While many of these are understandably focused on health and aging in place issues, there is al...
Dagmar Kern, Mark Stringer, Geraldine Fitzpatrick,...
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy