This paper presents the works done by several research groups from University of Extremadura and CETA-CIEMAT (Centro Extreme˜no de Tecnolog´ıas Avanzadas) in order to deploy an ...
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
This paper presents a mobile system that supports young students learning history at an archaeological site. It adopts gameplay as a novel and effective technique particularly suit...
Carmelo Ardito, Paolo Buono, Maria Francesca Costa...
Mobile technologies aim to assist people as they move from place to place going about their daily work and social routines. Established and very popular mobile technologies include...
Jill Freyne, Emil Varga, Daragh Byrne, Alan F. Sme...
Abstract: This paper proposes extensions to the Object-Role Modeling approach to support schema transformations that eliminate unneeded columns that may arise from standard relatio...
In this paper we describe a novel methodology for retrieving and combining information from multiple ontologies for the medical domain. In the last decades the number and diversity...
Vasco Pedro, Lucian Vlad Lita, Radu Stefan Nicules...
Mobile information systems need to collaborate with each other to provide seamless information access to the user. Information about the user and their context provides the points ...
The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provis...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...