When automating work, it is often desirable to compensate completed work by undoing the work done by one or more activities. In the context of workflow, where compensation actions...
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
Argues that metrics can be generated from search transactional Web logs that can help evaluate search engine effectiveness. Search logs from the BBC Website were analysed and metr...
Paul Huntington, David Nicholas, Hamid R. Jamali M...
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Today's Internet economy has primed customers to expect immediate access and immediate results. But instant results are difficult to achieve when your customers want up-to-th...