Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
Abstract. Business process (BP) modeling is a building block for design and management of business processes. Two fundamental aspects of BP modeling are: a formal framework that we...
Kamal Bhattacharya, Cagdas Evren Gerede, Richard H...
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
This paper introduces a user-centered design process and case study evaluation of a novel wearable visualization system for team sports, coined TeamAwear. TeamAwear consists of thr...
This paper introduces a novel imaging system composed of an array of spherical mirrors and a single highresolution digital camera. We describe the mechanical design and constructi...
Douglas Lanman, Daniel E. Crispell, Megan Wachs, G...