Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Location knowledge of nodes in a network is essential for many tasks such as routing, cooperative sensing, or service delivery in ad hoc, mobile, or sensor networks. This paper in...
Medical learning objects deviates from traditional notion of learning object in that it is always in a digital form and relates to medication. They may include text, images, sound...
One of the fundamental ideas of services and service oriented architecture is the possibility to develop new applications by composing existing services into business processes. Ho...