Both public media and IS research have produced a detailed view of different risks associated with computers. Measures to prevent systems risks from occurring are also well docume...
For sums of radicals Pk i=1 i di p i, where i; i are elements of some real algebraic number eld Q( ); di p i 2 R; we present a deterministic polynomial time algorithm to decide wh...
Tools that perform refactoring are currently under-utilized by programmers. As more advanced refactoring tools are designed, a great chasm widens between how the tools must be use...
The increased utilization of the Internet and the larger number of computers connected to it has brought up a significant security problem. Hackers or crackers have attacked compu...
“Crowdsourcing” is currently one of the most discussed key words within the open innovation community. The major question for both research and business is how to find and lev...
Winfried Ebner, Jan Marco Leimeister, Ulrich Brets...