This study investigates how individuals assess risks in IT development projects under different conditions. We focus on three conditions: the perceived control over the IT project...
Stephen Du, Mark Keil, Lars Mathiassen, Yide Shen,...
— We propose an efficient client-based approach for channel management (channel assignment and load balancing) in 802.11-based WLANs that lead to better usage of the wireless sp...
Arunesh Mishra, Vladimir Brik, Suman Banerjee, Ara...
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...
— One of the benefits of web services is their ability to participate in a web services composition process. Therefore, an end-to-end QoS infrastructure should be established. W...