Information Systems (IS) design research tends to emphasise the development of new methods (normative research), while addressing the evaluation of methods in only a limited fashi...
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
This paper describes the software package DSPNexpress 2000, a tool for the quantitative evaluation of systems specified in stochastic Petri nets, the Unified Modeling Language (UM...
—State signaling and maintenance mechanisms play crucial roles in communication network protocols. State is used to facilitate indirections in protocols such as routing. Design a...
Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar ...
In many mechanisms (especially online mechanisms), a strategic agent can influence the outcome by creating multiple false identities. We consider voting settings where the mechan...