Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
Bibliography—the collection, description, and arrangement of information items—is a vibrant activity and a popular form of expression on the internet. Yet, fashionable forms o...
A comparative case study used content analysis to observe the emergence of voluntary online learning communities in two blended courses. The study developed an interaction-based a...
Guided by knowledge transfer (KT) literature and Channel Expansion Theory (CET), we explore the relationship between the KT process, role-based experiences and media perceptions i...
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Geographic information technologies (GIT) have the potential to integrate information among multiple organizations. In fact, some of the most impressive advantages of using geo-sp...
Control and flexibility may appear an unlikely pair. However, we propose that effective flexible software development processes must still provide clear control mechanisms to mana...
Michael L. Harris, Alan R. Hevner, Rosann Webb Col...
The aims of this study are: (1) to examine to what extent critical care and advanced practice nurses’ participation in an online listserv constituted a community of practice, an...