Abstract. Active mathematical documents are distinguished from traditional paper-oriented ones by their ability to interactively adapt to a reader’s inputs. This includes changes...
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
Although Non-Functional Requirements (NFR) have been present in many software development methods, they have been faced as a second or even third class type of requirement, frequen...
Luiz Marcio Cysneiros, Julio Cesar Sampaio do Prad...
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
This paper explores the marketing of daily consumer goods in a pilot Web-based supermarket, in which no regular customers existed from among 65 registered ones at the end of the p...
Helena Ahola, Harri Oinas-Kukkonen, Timo Koivum&au...