We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
This paper employs the analysis of an interpretive case study within a Regional Train Operating Company (RTOC) to arrive at theoretical understandings of Information Systems (IS)....
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Automatically creating images that give a sense of content can be useful in a number of settings. Such images can summarize a larger collection of media in novel ways, giving an e...
When a supply chain is established supply chain management (SCM) needs supporting tools for the tasks of operative planning, scheduling, and coordination. These tasks have to be p...