When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
The purpose of this study is to develop a web-based Research Assistant System (RAS), a Knowledge Management System by community of practice, to improve the group performance of Re...
This paper argues for a return to fundamentals as we enter the new millennium. It argues that the field of Information Systems should no longer be distracted from its natural locu...
The application of 3D visualization technologies to cultural heritage has deeply evolved along years, shifting from the role of an ancillary technical solution to the dignity of a...