Abstract. This paper surveys the state of the art of agent-mediated electronic commerce (ecommerce), especially in business-to-consumer (B2C) e-commerce and business-to-business (B...
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
With the trend of globalization, enterprises require to extend their logistics scope from domestic to international, integrate logistics networks, and improve the agility and effi...
Charles V. Trappey, Amy J. C. Trappey, Gilbert Y. ...
Conventional implementations of CORBA communication middleware incur significant overhead when used for performance-sensitive applications over high-speed networks. As gigabit ne...
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...