Knowledge-intensive activities can typically not be modeled sufficiently by classical, static process models and workflows. To enable a process-oriented knowledge management appro...
Ludger van Elst, Felix-Robinson Aschoff, Ansgar Be...
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deï¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
The combination of high-performance processing power and flexibility found in network processors (NPs) has made them a good solution for today’s packet processing needs. Similar...