Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
Developments in higher education have driven interest in personalised education. Concomitant with these developments are the evolving capabilities of mobile technologies. Context ...
Technology presented in the paper [1] allows validation of software architecture before component upgrades. This paper presents a case study of applying this method to the upgrade ...
The growth of mobile commerce will require development of both demand and supply sides of the market. On the supply side, the development of mobile applications (e.g. games, calen...
We demonstrate Parakeet – a continuous speech recognition system for mobile touch-screen devices. Parakeet’s interface is designed to make correcting errors easy on a handheld...