Many applications provide a form-like interface for requesting information: the user fills in some fields, submits the form, and the application presents corresponding results. ...
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their pote...
Anne Durand, Pierre Drap, Elise Meyer, Pierre Grus...
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...