This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
Learning management systems capture student's interactions with the course contents in the form of event logs, including the order in which resources are accessed. We build on...
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
The Vehicle Routing Problem with Time Windows (VRPTW) is an important problem in logistics. The problem is to serve a number of customers at minimum cost without violating the cus...