In the preparation of technology transition, the contextual and alternative definitions of the usability heuristics of multifaceted role of the best practice methodology of Teleco...
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Established software development processes focus on delivering software within time and budget according to a set of requirements. However, practical experiences show that neither...
Governments are employing modern information and communication technologies to better serve society. Raising the effectiveness of government as well as the quality of the civil se...
Dimitrios S. Stamoulis, Dimitris Gouscos, Panagiot...