Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Out-of-core applications consume physical resources at a rapid rate, causing interactive applications sharing the same machine to exhibit poor response times. This behavior is the...
This paper describes Aerogility - an intelligent decision support system for managing service-based aftermarkets. Aerogility uses multi-agent software technology to implement a dy...
Viet Dung Dang, Steve Osborn, Gary Vickers, Malcol...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Passengers travelling in public transportation networks often have to use different lines to cover the trip from their origin to the desired destination. As a consequence, the rel...