Abstract--Change detection enables an evolutionary algorithm operating in a dynamic environment to respond with undertaking necessary steps for maintaining its performance. We cons...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
We are investigating how to empower nonprofit community organizations to develop the information technology management practices required to carry out their civic goals. We highli...
Cecelia Merkel, Umer Farooq, Lu Xiao, Craig H. Gan...
poster we present several methods for abstracting data into information and then integrating and organizing it for the purpose of display. We use an example from analysis of pilot...
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...