Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
One of the assumptions of current software for visualizing architecture is that the underlying geometry is a correct, objective, and complete representation of the objects in ques...
Exploratory data analysis is a process of sifting through data in search of interesting information or patterns. Analysts’ current tools for exploring data include database mana...
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...