: This paper investigates the relationship between broadband and service innovation in an e-government context. We ask, what characterizes successful broadband based service innova...
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
— Knowledge of the up-to-date physical (i.e., layer-2) topology of an Ethernet network is crucial to a number of critical network management tasks, including reactive and proacti...
Yigal Bejerano, Yuri Breitbart, Minos N. Garofalak...
Developing human-centered agent architectures requires the integral consideration of architectural flexibility, teamwork adaptability, and context reasoning capability. With the ...
In this paper, we present an extensible approach to the adaptation of Web information delivery according to different and possibly heterogeneous contexts. The approach is based o...