Abstract. To build high-quality personalized Web applications developers have to deal with a number of complex problems. We look at the growing class of personalized Web Applicatio...
Pieter Bellekens, Kees van der Sluijs, Lora Aroyo,...
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
This paper describes and contrasts findings from two related projects where groups of science pupils investigated local air pollution using a collection of mobile sensors and devic...
We try to close the gap between theoretical investigations of wireless network topologies and realistic wireless environments. For point-to-point communication, we examine theoret...
The transition of search engine usersā intents has been studied for a long time. The knowledge of intent transition, once discovered, can yield a better understanding of how diļ...