The paper deals with the effects of information technology in organizations with a particular emphasis on the role of motivation of the organizational members. Giddens' Theor...
Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist ...
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
The IPACS-project (Integrated Performance Analysis of Computer Systems) was founded by the Federal Department of Education, Science, Research and Technology (BMBF) in the program ...
In this paper we report new results concerning use of genetic algorithms in conformational analysis, field of pharmacy related to discovery and design of new drugs. The goal is to ...
Aleksander Wawer, Franciszek Seredynski, Pascal Bo...
Using computers for different task including enhancement, description and evaluation of signals we typically include three steps: signal processing (for obtaining signal of better ...
Search results clustering problem is defined as an automatic, on-line grouping of similar documents in a search hits list, returned from a search engine. In this paper we present t...
Search results clustering problem is defined as an automatic, on-line grouping of similar documents in a search results list returned from a search engine. In this paper we present...