Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Abstract. There are many definitions for Mobile Electronic Commerce (MCommerce). We define M-Commerce as any type of transaction of an economic value having at least at one end a m...
Using a nonlinear 15-state helicopter model in 6 DOF, two di erent neural control systems, both acting as rate damping, have been designed and compared. They are both based on the ...
This paper presents observations of traffic to and from a particular World-Wide Web server over the course a year and a half. This paper presents a longitudinal look at various ne...
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...