In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
This paper presents the results of a case study examining prototyping as a method in re-designing a user interface (UI). In the case presented, a web-based room booking was re-des...
Per A. Jonasson, Morten Fjeld, Aiko Fallas Yamashi...
Personalization actions that tailor the Web experience to a particular user are an integral component of recommender systems. Here, product knowledge - either hand-coded or “mine...
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...