In a mobile setting, users use, handle and search for online information in a different way. Two features typically desired by mobile users are tailored information delivery and co...
William Van Woensel, Sven Casteleyn, Olga De Troye...
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
For deaf persons to have ready access to information and communication technologies (ICTs), the latter must be usable in sign language (SL), i.e. include interlanguage interfaces....
Abstract. To build high-quality personalized Web applications developers have to deal with a number of complex problems. We look at the growing class of personalized Web Applicatio...
Pieter Bellekens, Kees van der Sluijs, Lora Aroyo,...
In this paper, a P2P(Peer-to-Peer) streaming approach is proposed for the implementation of ubiquitous personal IPTV systems which allow any Internet users with proper network con...