This paper investigates how innovation of ICT based services takes place within existing infrastructures, including the whole network of technology, vendors and customers. Our res...
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Abstract. The successful application of ubiquitous computing in crisis management requires a thorough understanding of the mechanisms that extract information from sensors and comm...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....
Abstract. We develop a statistical mechanical interpretation of algorithmic information theory by introducing the notion of thermodynamic quantities, such as free energy, energy, s...