1 The latent semantic indexing (LSI) methodology for information retrieval applies the singular value decomposition to identify an eigensystem for a large matrix, in which cells re...
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
This paper seeks to frame one aspect of the Smart Grid discussion which has been under-recognized in regulatory and policy debates. Significant discussion has focused Smart Grid a...
Richard D. Tabors, Geoffrey Parker, Michael C. Car...
Today, there exists a huge variety of business document models for electronic data exchange among business partners used in business-to-business, business-to-government, as well a...
Michael Strommer, Christian Pichler, Philipp Liegl
Service oriented device architecture (SODA) is a promising approach for overcoming interoperability issues and especially for extending the IT support of business processes to dev...
Christian Mauro, Jan Marco Leimeister, Helmut Krcm...
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...