130
click to vote
WMC
14 years 11 months ago
2004
: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
123
click to vote
EGCDMAS
14 years 11 months ago
2004
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
119
click to vote
ECWEB
15 years 3 months ago
2004 Springer
Abstract. Most e-commerce Web sites dynamically generate their contents through a three-tier server architecture composed of a Web server, an application server, and a database ser...
104
click to vote
SIGECOM
15 years 3 months ago
2004 ACM
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
103
click to vote
ACMICEC
15 years 3 months ago
2004 ACM
Public administrations of all over the world invest an enormous amount of resources in e-government. How the success of egovernment can be measured is often not clear. E-governmen...
|