—People with long term health conditions often experience a radically reduced quality of life and suffer from a range of symptoms. Self management can encourage patients with a c...
Huiru Zheng, Chris D. Nugent, Paul J. McCullagh, N...
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
The unique capabilities of mobile, context-aware, networked devices make them an interesting platform for applying suggestion in persuasive technologies. Because these devices are ...
Adrienne H. Andrew, Gaetano Borriello, James Fogar...
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
As Consumer Electronics devices get interconnected, the issue of aligning their data management solutions becomes prominent. If we want to deploy comprehensive applications that ar...