Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
: Contrary to a Wiki where the opinion of the individual user disappears in favor of a more impartial `collective intelligence', a weblog is author-centered, expressing the au...
In this paper we present multimedia adaptation strategies for live video streams, at the streaming server, where we switch among several versions of the coded multimedia to match ...
Deepak S. Turaga, Ahmed Abd El Al, Chitra Venkatra...
: Radio Frequency Identification (RFID) is currently considered a hot topic in the IT arena. It is described as a major enabling technology for automated contactless wireless data ...
Jan Marco Leimeister, Uta Franziska Knebel, Helmut...
Projects are the executors of organizational change and hence in charge of the managed evolution of the application landscape in the context of enterprise architecture (EA) managem...
Sabine Buckl, Alexander M. Ernst, Florian Matthes,...