We currently observe a rising interest in mobile broadband, which users expect to perform in a similar way as its fixed counterpart. On the other hand, the capacity allocation proc...
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
Web-based learning tools provide integrated environments of various technologies to support diverse educators' and learners' needs via the Internet. This paper reports t...
Margaret-Anne D. Storey, B. Phillips, Mechthild Ma...
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
A video stream from a single camera is often the foundation for situational awareness in teleoperation activities. Poor camera placement, narrow field-of-view and other camera pro...