In many applications transactions between the elements of an information hierarchy occur over time. For example, the product offers of a department store can be organized into pro...
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, microblogging, o...
Iraklis Varlamis, Magdalini Eirinaki, Malamati D. ...
This paper describes the evolution of a concept, Contact Point, the research process through which it evolved, and the work context and practices which drove its evolution. Contac...