Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
The 1-versus-2 queries problem, which has been extensively studied in computational complexity theory, asks in its generality whether every efficient algorithm that makes at most 2...
This paper extends the resource-based view of the firm to a less developed country situation by challenging three boundary conditions associated with the theory: first, the theory...
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
The problem of guessing a random string is revisited and some prior results on guessing exponents are re-derived using the theory of large deviations. It is shown that if the seque...