Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Probabilistic verification techniques have been applied to the formal modelling and analysis of a wide range of systems, from communication protocols such as Bluetooth, to nanosca...
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...
In this paper we describe a tool to improve interfunctional communication of project plans by displaying them as a metro map. Our tool automatically lays out plans using a multicr...
Jonathan M. Stott, Peter Rodgers, Remo Aslak Burkh...
We present a study of people’s use of positional information as part of a collaborative location-based game. The game exploits self-reported positioning in which mobile players m...
Steve Benford, Will Seager, Martin Flintham, Rob A...