In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception stu...
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
This research characterizes the spontaneous spoken disfluencies typical of human-computer interaction, and presents a predictive model accounting for their occurrence. Data were c...