In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
In three-tiered web applications, some form of admission control is required to ensure that throughput and response times are not significantly harmed during periods of heavy load....
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
It is well-known that wavelet transforms provide sparse decompositions over many types of image regions but not over image singularities/edges that manifest themselves along curve...