We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...
In the context of ERP implementation, leadership is consistently found to be the most important factor leading to implementation success. However, most of the studies focus on lea...
The Panko–Halverson Taxonomy of Spreadsheet Risks has been widely used since its creation in the 1990s. This paper revises that taxonomy. It introduces new ways to count cell er...
This paper examines how different facets of favorable user behavior drive the success of an online community by using a unique data set with surveys from 1,389 participants from t...
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individuals local context can be utilized to redu...
A simple dynamic model of agent operation of an infrastructure system is presented. This system evolves over a long time scale by a daily increase in consumer demand that raises t...
Benjamin A. Carreras, David E. Newman, Ian Dobson,...
Setting electric transmission tariffs is a classical multi-objective problem. The tariff problem is particularly challenging in modern power markets where transmission has been se...
We describe a platform for performing text and radiology analytics (TARA). We integrate commercially available hardware and middleware components to construct an environment which...