Information about the impending collision of an approaching object can be specified by visual and auditory means. We examined the discrimination thresholds for vision, audition, an...
Liu Zhou, Jingjiang Yan, Qiang Liu, Hong Li, Chaox...
: This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for ...
Nathan Lea, Stephen Hailes, Tony Austin, Dipak Kal...
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Face-to-face meetings between auditors and their clients are increasingly difficult to arrange, due to business globalization and the growing need for rapid audit decision-making....
This paper studies the pricing of software development outsourcing. Two pricing techniques – time and material and fixed price – are described and the economic conditions for ...