Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
Information transfer under time pressure and stress often leads to information loss. This paper studies the characteristics and problems of information handover from the emergency...
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...
Using OTS (Off-The-Shelf) components in software development has become increasingly popular in the IT industry. OTS components can be either COTS (Commercial-Off-The-Shelf), or O...
Jingyue Li, Reidar Conradi, Odd Petter N. Slyngsta...