The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Today, we observe a wide use of geospatial databases that are implemented in many forms (e.g. transactional centralized systems, distributed databases, multidimensional datacubes)....
This paper describes the building of a research library for studying the Web, especially research on how the structure and content of the Web change over time. The library is part...
William Y. Arms, Selcuk Aya, Pavel Dmitriev, Blaze...
Interactive environment-aware display bubbles have been introduced in a novel display metaphor [3] which allows screens to be instantiated with a freeform shape anywhere on demand...
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...