The paper analyses existing open source licenses with the aim of choosing a license that is suitable for e-Governance projects. A method is presented for systematically choosing t...
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
In rapidly growing open environments such as the Internet, users experience information starvation in the midst of data overload, due to di culties similar to nding the needle in a...
This paper presents a novel method and algorithm to measure the size of an open source project’s user base and the level of potential user interest that it generates. Previously ...
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...