—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
: With the rapidly escalating costs, the EU and the US make the adoption and application of Information, Computer and Communication Technologies (ICCT) in healthcare (e-health) an ...
Goal-oriented methods have increasingly been recognised as an effective means for eliciting, elaborating, analysing and specifying software requirements. A key activity in these a...
Alessandra Russo, Dalal Alrajeh, Jeff Kramer, Seba...
Drawing on an ethnographic study of hospital work in an operating room, we present the design and implementation of a web-based role-playing application of a master schedule. We s...
Elisa Mattarelli, Kelly J. Fadel, Suzanne P. Weisb...
— An approach to mitigating interference between 802.16 license-exempt systems is proposed in this paper. More specifically, the approach focuses on solving problems which arise...