The aim of this paper is to discourse about the utilization of electronic government as an instrument of State's social control, with the intensification of the use of inform...
Robert Willecke, Hugo Cesar Hoeschl, Marco Aur&eac...
One of the most important and challenging questions in the area of clustering is how to choose the best-fitting algorithm and parameterization to obtain an optiml clustering for t...
Martin Hahmann, Peter Benjamin Volk, Frank Rosenth...
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...