Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
In the universal DNA chip method, target RNAs are mapped onto a set of DNA tags. Parallel hybridization of these tags with an indexed, complementary antitag array then provides an ...
John A. Rose, Russell J. Deaton, Masami Hagiya, Ak...
In a combined negotiation in e-commerce, the user is interested in many goods or services and consequently engages in many negotiations at the same time. The negotiations are inde...
Reusing assets during application engineering promises to improve the efficiency of systems development. However, in order to benefit from reusable assets, application engineeri...
Joachim Bayer, Cristina Gacek, Dirk Muthig, Tanya ...