Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
A Web-based business always wants to have the ability to track users’ browsing behavior history. This ability can be achieved by using Web log mining technologies. In this paper...
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...