In this paper, we present the design and simulation of a bandwidth constrained multiple path on-demand routing protocol for ad-hoc networks to support end-to-end Quality of Servic...
In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterog...
Junseok Hwang, Praveen Aravamudham, Elizabeth D. L...
e-Negotiation involves two or more agents multilaterally bargaining for mutual gain, using information technologies in a cooperative problem-solving (CPS) environment. This paper ...
P2P applications have found a lot of interest lately but there are open questions about the viability of the revenue models behind P2P applications/ services. In this paper, we di...
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Researchers have cogently presented the technical case for converged telecommunications systems. However, it is not clear how market-based telecommunications providers are embraci...
This paper describes critical factors for co-ordinated enterprise and IS/IT development and change in complex organizations in Sweden. These factors represent an answer on the cru...
In this article we explore the short and largely undocumented history of electronic government, discuss the literature of e-government at the local government level, and document ...
Stephen H. Holden, Donald F. Norris, Patricia D. F...
In recent literature, many authors argue that “Web development” is new and different. The arguments are, however, both debatable and debated, and often it is neither clear wha...