Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
Mobile recommender systems have the potential to substantially enrich tourist experiences. As their handling marks a big challenge for ordinary users, its acceptance can only be e...
Marko Modsching, Ronny Kramer, Klaus ten Hagen, Ul...
The rise in social computing has facilitated a shift from consumer cultures to cultures of participation. These developments represent unique and fundamental opportunities and cha...
The small form-factor and significantly high bandwidth of 60 GHz wireless network interfaces make them an attractive technology for future bandwidth-hungry mobile devices. To ove...
Kishore Ramachandran, Ravi Kokku, Rajesh Mahindra,...
The successful execution of workflows using mobile services is dependant on the services behaving as expected. The management of this behaviour in Akogrimo is achieved by a contex...
Robert B. Piotter, Tom Kirkham, Julian R. Gallop, ...