—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
Millions of laypersons need more medical information than they are customarily provided during their doctor’s visit. Health websites can help fill this knowledge gap, but the te...
The transparency created by enterprise models is a valuable support for organizational engineering and especially enterprise transformation. However, current approaches are hardly...
—We apply social network analysis (SNA) to examine the dynamics of leadership in distributed groups, specifically Free/Libre Open Source Software development projects, and its r...
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
The topic of virtualization has received renewed attention. Xen is a popular open source type-I hypervisor. The Xen hypervisor currently has limited capabilities for runtime modi...
The current trend towards dynamic and highly scalable service provisioning fosters the rise of Software as a Service (SaaS) platforms and so called Compute Clouds. The on-demand p...
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part becaus...
This current study explored the impact of individual differences in personality factors on interface interaction and learning performance in both an interactive visualization and ...