This paper describes the development of a decision support tool, an adoption assessment matrix based on critical adoption factors, that addresses a need in industry; namely, to im...
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Most recent schema matching systems assemble multiple components, each employing a particular matching technique. The domain user must then tune the system: select the right compo...
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Software inspection is a method to detect errors in software artefacts early in the development cycle. At the end of the inspection process the inspectors need to make a decision ...
Achin Jain, Alok R. Patnaik, Pulak Dhar, Vineet Sr...