System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
Researchers have explored the design of ambient information systems across a wide range of physical and screen-based media. This work has yielded rich examples of design approache...
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program fa...
Daniel Sundmark, Anders Pettersson, Christer Sandb...