Growth in the IT outsourcing industry during the past ten years has been exceptional. In this study, we theorize about and analyze the growth patterns of IT outsourcing at the leve...
Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie ...
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
We present two studies to assess which physical factors of various input devices influence 3D object movement tasks. In particular, we evaluate the factors that seem to make the m...
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...