Activity and context recognition in pervasive and wearable computing ought to continuously adapt to changes typical of open-ended scenarios, such as changing users, sensor characte...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Elsa Kosmack Vaara Kristina H??k The Affective Health system is a mobile lifestyle application that aims to empower people to reflect on their lives and lifestyles. The system logs...
Elsa Kosmack Vaara, Jakob Tholander, Kristina H&ou...
The paper describes an approach to modeling the strategic variations in performing secondary tasks while driving. In contrast to previous efforts that are based on simulation of a...