Given the continuous growth of databases and the abundance of diverse files in modern IT environments, there is a pressing need to integrate keyword search on heterogeneous inform...
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder ...
Jill Palzkill Woelfer, Amy Iverson, David G. Hendr...
In this paper, we explore the role that attribution plays in shaping user reactions to content reuse, or remixing, in a large user-generated content community. We present two stud...
This paper describes the design and implementation of a model of how to integrate sensors and devices into a GRID infrastructure. We describe its proxy-based approach, the port-ty...
Jan Humble, Chris Greenhalgh, Alastair Hampshire, ...
We present Data Auditor, a tool for exploring data quality and data semantics. Given a rule or an integrity constraint and a target relation, Data Auditor computes pattern tableau...
Lukasz Golab, Howard J. Karloff, Flip Korn, Divesh...