In this article we explore the short and largely undocumented history of electronic government, discuss the literature of e-government at the local government level, and document ...
Stephen H. Holden, Donald F. Norris, Patricia D. F...
We examine the drivers of Internet firm survival using a multi-method survival analysis. Based on previous literature on business failure and recent IS research on e-commerce busi...
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Background: Two-dimensional gel electrophoresis (2DE) is a powerful technique to examine post-translational modifications of complexly modulated proteins. Currently, spot detectio...
Werner W. V. B. Van Belle, Nina N. A. Anensen, Ing...
Background: Enhancements in sequencing technology have recently yielded assemblies of large genomes including rat, mouse, human, fruit fly, and zebrafish. The availability of larg...
Eric C. Rouchka, Abdelnaby Khalyfa, Nigel G. F. Co...