Improvements can be made for tendering processes to solve B2B interoperability and integration problem by means of Web services technology. In this paper, we detail our tendering ...
Lick Lun Nick Ng, Dickson K. W. Chiu, Patrick C. K...
Software defects lead to security vulnerabilities, which are costing businesses millions of dollars each year and threaten the security of individuals and the nation. It can be de...
The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment,...
Ignacio J. Martinez-Moyano, Stephen H. Conrad, Dav...
Amidst constant innovation in information and communication technologies, a new pattern of work is emerging. Hierarchical authority structures are giving way to greater decision-m...
Integration is important in politics, business, and technology. In all these fields, the definition of integration is vague. We build a formal measure of integration based on the ...
This paper analyzes the retrospective stories of a four person team responsible for developing a new computer game for mobile phones. Our theorizing is based on an in-depth, two y...
This paper provides a list of factors that influence the outcome of standard battles. We have developed this list by performing a meta-analysis of 103 papers. An extensive literat...
Geerten van de Kaa, Henk Jan de Vries, Eric van He...
Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a large number of tests in little time, whereas manual...
Andreas Leitner, Ilinca Ciupa, Bertrand Meyer, Mar...
Checkpointing is a commonly used approach to provide fault-tolerance and improve system dependability. However, using a constant and preconfigured checkpointing frequency may comp...