Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
While code understanding is the primary program comprehension activity, it is quite challenging to recognize the application requirements from code, since they have usually been o...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
Archaeology is a destructive process in which accurate and detailed recording of a site is imperative. As a site is exposed, documentation is required in order to recreate and und...
Peter K. Allen, Steven Feiner, Alejandro Troccoli,...
To create an understanding of enterprises and the ways they do business, a starting point could be to identify the main actors and the values transferred between them. Business mod...
Birger Andersson, Maria Bergholtz, Ananda Edirisur...
Abstract Peer-to-peer markets going mobile spur spontaneity in trading considerably. Spontaneity, however, imposes severe informational requirements on the market participants. Inf...