We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Small companies in the software product business risk rework and market failure due to shortcomings in integrating a strategic perspective into management of product development. ...
The paradigm of service-oriented computing (SOC) has emerged as an architectural approach to flexibility and agility, not just in systems development but also in business process ...
Collaborative filtering techniques are widely used by many E-commerce sites for recommendation purposes. Such techniques help customers by suggesting products to purchase using o...