In service computing, the behavior of a service may evolve. When an organization develops a service-oriented application in which certain services are provided by external partner...
The growing trends towards integrating legacy applications with new systems in a network-centric environment has introduced yet another level of complexity beyond those we witness...
Supply chains have evolved to web-applications that tap on the power of internet to expand their networks online. Recently some research attention is focused on make-to-order supp...
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Classic direct mechanisms require full type (or utility) revelation from participating agents, something that can be very difficult in practical multi-attribute settings. In this...