Investments in innovative technologies face uncertainties and are often made in stages. We develop a multi-period game-theoretical model where the potential of a new technology is...
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
The increased fluidity and agility of organizations demand the smooth mediation of information technology (IT) between user and task. As rigid hierarchies are giving way to open, ...
In the domain of logistics, Radio Frequency Identification (RFID) promises a plethora of benefits due to an enhanced efficiency, accuracy, and preciseness of object identification...
This work reports the experience on the design and deployment of a WSN-based system for monitoring the productive cycle of high-quality wine in a Sicilian winery. Besides providin...
Giuseppe Anastasi, Orazio Farruggia, Giuseppe Lo R...
The importance of communication, information sharing and interoperability in an emergency response scenario have risen recently based on the frequency of disasters throughout the ...
The Gulf Cooperation Council (GCC) is nearing the completion of a high voltage transmission system designed to integrate the power systems of Saudi Arabia, Kuwait, Bahrain, Qatar,...
While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority ...
This paper presents a semantic associative browsing system called Semantic Association Various Viewpoint sYstem (SAVVY). Recently, the number of users who employ search engines fo...
Takafumi Nakanishi, Koji Zettsu, Yutaka Kidawara, ...