Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
Abstract. To determine the magnitude of risk factors in offshore software development, we explain how structural equation modeling works for questionnaire samples. Each response to...
Our goal is to integrate traditional artistic media that demand hand dexterity (such as drawing) with intelligent systems techniques that may both constrain and nourish this dexte...
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....