The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has re...
In building a successful website it is imperative that the design matches the organization’s objectives, which should be well defined. Clearly, different types of websites will ...
This paper presents technical foundation, roadmap and initial results of the IDIOM project (Information Diffusion across Interactive Online Media). Information spreads rapidly acr...
Abstract— A methodology for designing data center infrastructure for E-commerce sites is developed. It differs from existing methodologies in that it evaluates and compares alter...
The focus of this paper is to introduce a comprehensive model for assessing and improving the maturity of Collaboration Engineering (CE) processes. The model is targeted at introd...
Eric L. Santanen, Gwendolyn L. Kolfschoten, Kastur...
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
How do people work with large document collections? We studied the effects of different kinds of analysis tools on the behavior of people doing rapid large-volume data assessment,...
Daniel M. Russell, Malcolm Slaney, Yan Qu, Mave Ho...
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...