Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
In this paper, we describe the development of an Embodied Conversational Agent (ECA) implementing the concept of a companion, i.e. an agent supporting the persistent representatio...
Marc Cavazza, Cameron Smith, Daniel Charlton, Li Z...
Wireless data broadcasting is well known for its excellent scalability. Most geographical data, such as weather and traffic, is public information and has a large number of potenti...
Data warehouses (DWs) are complex computer systems whose main goal is to facilitate the decision making process of knowledge workers. ETL (Extraction-Transformation-Loading) proces...
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as lat...
David J. Roberts, Damien Marshall, Rob Aspin, S&ea...