This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
In this paper we analyze the role of Enterprise System (ES) in shaping a company’s transformation process by conducting an in-depth case study in a large European high-tech comp...
Merja Mattila, Joe Nandhakumar, Petri Hallikainen,...
Personal health records (PHR) is a technology for managing the information playing field in healthcare. With multiple vendors competing on this relatively new market, an evaluatio...
Ali Sunyaev, Dmitry Chornyi, Christian Mauro, Helm...
Numerous recent reports have assessed the adequacy of current generating capacity to meet the growing electricity demand from Plug-in Hybrid Electric Vehicles (PHEVs) and the pote...
Chris Farmer, Paul Hines, Jonathan Dowds, Seth Blu...
We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We...
Brian E. Mennecke, Janea L. Triplett, Lesya M. Has...
Service oriented device architecture (SODA) is a promising approach for enabling a continuous IT support of medical processes in hospitals. However, there is a lack of specific de...
Christian Mauro, Ali Sunyaev, Jan Marco Leimeister...
The climate change has challenged urban living: As an omnipresent force nature sets the agenda for urban life. Using stakeholder theory for conceptualizing urban life, we install ...
It seems common sense that “policy matters” in setting up e-government interoperability, mainly because collaboration should be guided by dedicated integration objectives and ...