While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
This paper reports results from an exploratory study investigating the activity patterns of pair programming using a student project conducted over a period of nine weeks. We foun...
Business objects are object-oriented representations of the concepts of interest in an organization, such as activities, resources and actors. Business objects collaborate with on...
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent d...
Judee K. Burgoon, Mark Adkins, John Kruse, Matthew...
‘Today’ messages are short status emails sent daily by members of a project team. We present the results of a field study of the use of ‘today’ messages by six small work ...
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
This paper shows how XML can be used for static and dynamic analysis of architectures. Our analysis is based on the distinction between symbolic and semantic models of architectur...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...