Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
With the popularity of both travel and Web, more and more people use online travel services to facilitate their travel activities or share their travel experiences. Considering th...
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Mobile phones are being increasingly equipped with sensors that ease retrieval of context information about a user. Context data can be aggregated with information centrally avail...
Laurent-Walter Goix, Massimo Valla, Laura Cerami, ...
The location-aware keyword query returns ranked objects that are near a query location and that have textual descriptions that match query keywords. This query occurs inherently i...