Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Suppose one is considering purchase of a computer equipped with accelerators. Or suppose one has access to such a computer and is considering porting code to take advantage of the...
Laura Carrington, Mustafa M. Tikir, Catherine Olsc...
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...