This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
One specific problem in wide-area distributed computing environment is effective management of the vast amount of resources that are made available within the grid environment. Th...
Ghazala Shaheen, Muhammad Usman Malik, Zohair Ihsa...
In the 21st century, organizations are experiencing environmental changes characterized by indistinct organizational boundaries and fast-paced change. As a result firms need appro...
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Providing comprehensive accessibility is the major challenge for tourism service providers to address people with disabilities (and older people) as growing consumer groups. Infor...
Software organizations follow capability models in order to aggregate quality to their processes and products. Process measurement and analysis are key issues, but their implement...
Duncan Dubugras A. Ruiz, Karin Becker, Taisa C. No...
Keywords, restricted vocabularies (RVs), thesauri, and catalogues are introduced leading up to discussion of the need for full ontologies to describe the full logical and relation...
We address the problem of efficient support for active rules in XML database systems. We describe a general form of active rules for XML based on XQuery and a previously defined...