Computers are ever more thought of to support cooperative work over distances. Thus tele-cooperation tools and environments are needed which bring the meeting and joint-working ont...
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Abstract. A public-key cryptosystem is usually used for key management, in particular to session key management. The paper presents a method for handling a batch of concurrent keys...
During software evolution a collection of related artifacts with different representations are created. Some of these are composed of structured data (e.g., analysis data), some c...
Andrian Marcus, Andrea De Lucia, Jane Huffman Haye...