— All large vendors of standard business software have announced to move to service oriented architecture. They claim benefits for their customers with regard to agility and ope...
Numerical simulators are frequently used to assess future risks, support remediation and monitoring program decisions, and assist in design of specific remedial actions with respe...
Jared Chase, Karen Schuchardt, George Chin Jr., Je...
: This article proposes a new Ubiquitous Computing (UC) infrastructure for open access to object data that will come along with a new research agenda especially for the field of Wi...
Detlef Schoder, Christian Schmitt, Kai Fischbach, ...
This paper relates experiences of a project where an ethnographic study of air traffic controllers is being used to inform the design of the controllers' interface to the fli...
Richard Bentley, John A. Hughes, David Randall, To...
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...