Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
A real-time active database system (RTADBS) has to provide capabilities for timely trigger of timeconstrained transactions and at the same time to process them, concurrently with ...
A review of the various models of New Product Development (NPD) process shows that although different approaches have been proposed, they are in fact all variants on a linear them...
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
In this paper we present a new fanout optimization algorithm which is particularly suitable for digital circuits designed with submicron CMOS technologies. Restricting the class o...