Recently, peer-to-peer systems have become widely accepted and are probably the most recognizable examples of distributed applications. As they are maturing and their functionalit...
In this paper a typology is introduced for interorganisational control mechanisms for network organisations. We also show how the design and analysis of such inter-organisational ...
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
An enterprise architecture (EA) identifies the main components of the organization, its information systems, the ways in which these components work together in order to achieve d...
Stephen H. Kaisler, Frank Armour, Michael Valivull...
Ad hoc cross-agency teams are often needed to deal with actual, imminent, or potential crises that involve multiple geographic or political jurisdictions or require coordinated ex...
Whereas the conventional applications mostly assume stationary or fixed users, more and more emphasis is placed on mobility, the need for people to stay connected while moving aro...
—Subvocal electromyogram (EMG) signal classification is used to control a modified web browser interface. Recorded surface signals from the larynx and sublingual areas below the ...
Design documents can be exchanged in business-tobusiness networks through Product Data Management (PDM) system integration. This rarely used approach provides new possibilities fo...