—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
New currency recirculation guidelines implemented by the Federal Reserve System (Fed) of the United States are intended to reduce the overuse of its currency processing services b...
H. Neil Geismar, Milind Dawande, Divakar Rajamani,...
One of the main reasons behind unfruitful software development projects is that it is often too late to correct the problems by the time they are detected. It clearly indicates th...
The IMS Question and Test Interoperability (QTI) standard has had a restricted take-up, in part due to the lack of tools. This paper describes the `ASDEL' test delivery engine...
Gary B. Wills, Jonathon S. Hare, Jiri Kajaba, Davi...
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...