This article presents a method for valuing software, based on the income that use of that software is expected to generate in the future. It applies well known principles of intel...
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archiv...
In this paper we use policy-iteration to explore the behaviour of optimal control policies for lost sales inventory models with the constraint that not more than one replenishment...
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
We propose a novel method to support analytical processes by visually integrating context information directly into web pages. The context information is obtained from knowledge b...