In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
This paper examines knowledge sharing processes in digital government projects (DGPs). Although knowledge sharing processes are a central feature of the functioning of government,...
: Only about 5% of the companies which could profit from EDI actually use it. The main reason is that especially small and medium-sized enterprises (SMEs) try to avoid the consider...
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Scalability in QoS-aware multicast deployment has become an important research dimension in recent years. In this paper we propose a new scheme named Differentiated QoS Multicast ...