Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
Product development requires the ability to check design consistency, to verify design properties, and to answer questions about a design's possible implementations. These tas...
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
The recent non-uniform subdivision approach extends traditional uniform subdivision schemes with variable rules, offering additional shape parameters (such as knot spacings) for f...
In this paper, we describe a simulation game designed to quantify the benefits of an enterprise resource planning system coupled with the balanced scorecard framework in an extend...
James Ritchie-Dunham, Douglas J. Morrice, Judy E. ...