IT value remains a serious concern of management today, especially how it should be measured and how it is created. Although we have made significant progress at the firm and aggre...
Prabu Davamanirajan, Robert J. Kauffman, Charles H...
In this research, we re-arrange FIPA’s ACL performatives to form a subsumption lattice (ontology) and apply a theory of social commitments to achieve a simplified and observable...
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Single-event upsets from particle strikes have become a key challenge in microprocessor design. Techniques to deal with these transient faults exist, but come at a cost. Designers...
Shubhendu S. Mukherjee, Christopher T. Weaver, Joe...
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger