In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Abstract. IT service delivery is challenging to study. It is characterized by interacting systems of technology, people, and organizations. The work is sometimes reactive, sometime...
Eser Kandogan, Eben M. Haber, John H. Bailey, Paul...
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery...
Christopher Dabrowski, Kevin L. Mills, Jesse Elder
Nowadays, there are hundreds of Natural Language Processing applications and resources for different languages that are developed and/or used, almost exclusively with a few but no...
Dan Tufis, Radu Ion, Alexandru Ceausu, Dan Stefane...
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...