In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
We detail the methodology of ‘trace ethnography’, which combines the richness of participant-observation with the wealth of data in logs so as to reconstruct patterns and prac...
This paper describes a highly mobile collaborative patient-centric, self-monitoring, symptom recognition and self intervention system along with a complementary clinical nursing t...
Enterprise mashups (EMs) are a new technology that enables the automation of situational needs of knowledge workers. EMs imply a new development paradigm based on the peer product...
Volker Hoyer, Katarina Stanoevska-Slabeva, Simone ...
There has been something of an academic debate between proponents of two different kinds of computer self-efficacy: general computer self-efficacy ala Compeau and Higgins on the o...
In this paper, we describe wireless grids, an emerging technology that enables ad hoc sharing of resources (such as screen, services and microphone) on edge devices (such as mobil...
Angela Usha Ramnarine-Rieks, Lee W. McKnight, Ruth...
We introduce WordBridge, a novel graph-based visualization technique for showing relationships between entities in text corpora. The technique is a node-link visualization where b...
KyungTae Kim, Sungahn Ko, Niklas Elmqvist, David S...
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...