In PODC 2003, Micali presented a fair electronic exchange protocol for contract signing with an invisible trusted party [17]. The protocol was filed as a US patent No 5666420 in 1...
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
We propose a new requirements elicitation method in such a domain of ERP, CRM, and SCM by using specifications of several existing package software. We have analyzed the requirem...
The organization of documents is a task that we face as computer users daily. This is particularly true for management of email. Typically email documents are organized in director...
Current BtoC recommendation services utilize consumers’ purchased log as criteria for selecting information, yet it includes little information of the reason why he bought the i...