This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
—Mass adoption of virtual world platforms for education and training implies efficient management of computational resources. In Second Life Grid and OpenSimulator, commonly used...
Andreas Vilela, Marcio Cardoso, Daniel Martins, Ar...
This article discusses Nokia’s experiences of using open source in commercial product development. It presents the development model used in the creation of mobile consumer devic...
In this paper, we aim to identify what kinds of knowledge management (KM) challenges are typical in the renewal of software development processes, and to propose solutions to the ...