This research explores how ideas occur in creative work and the strategies and tools used to represent and develop them. We describe the analysis of an open questionnaire survey o...
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
The I/O performance of query processing can be improved using two complementary approaches. One can try to improve on the buffer and the file system management policies of the DB ...
This paper proposes a definition, scope and topics of construction informatics--a discipline also known as `construction IT' or `communication and information technologies in...
Finding out about a topic online can be time consuming. It involves visiting multiple news sites, encyclopedia entries, video repositories and other resources while discarding irr...
Francisco Iacobelli, Kristian J. Hammond, Larry Bi...