Abstract: The application of Web 2.0 tools and methodologies in the domain of eGovernment is not yet a fully exploited area due to the immaturity of the software support, and the l...
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Collaboration is a hot issue, and is to an increasing extent recognized as a key driver of overall business performance. However, few companies methodically evaluate how well they...
This paper proposes a new methodology to schedule activities in projects with stochastic activity durations. The main idea is to determine for each activity an interval in which th...