This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
Expert judgement is still the dominant technique in practice today for estimation of software project size and effort. In this paper, two instruments are evaluated that have been ...
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys i...
Getting students to collaborate on group projects in a face-to-face scenario can be difficult enough -- but how does one approach collaborative projects in a Web-based environment...