We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Research on knowledge management (KM) readiness has matured. However, recent organizational structures have emerged which prevent traditional instruments from adequately measuring...
Mark Keith, Michael Goul, Haluk Demirkan, Jason Ni...
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...