Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Both academics and practitioners have invested considerably in the information systems evaluation arena, yet rewards remain elusive. The aim of this paper is to provide rich insig...
This paper analyses the structure of the Internet marketplace and the business relationships of key players involved in network services provision. A brief overview of existing pr...
A multiprocessor virtual machine benefits its guest operating system in supporting scalable job throughput and request latency--useful properties in server consolidation where ser...
Decentralized MDPs provide a powerful formal framework for planning in multi-agent systems, but the complexity of the model limits its usefulness. We study in this paper a class o...
Raphen Becker, Shlomo Zilberstein, Victor R. Lesse...