The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this contex...
Almost all Web searches are carried out while the user is sitting at a conventional desktop computer, connected to the Internet. Although online, handheld, mobile search offers ne...
Matt Jones, George Buchanan, Tzu-Chiang Cheng, Pre...
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
This paper is concerned with handling uncertainty as part of the analysis of data from a medical study. The study is investigating connections between the birth weight of babies an...
This study extends the theory of Recognition Primed Decision-Making by applying it to groups. Furthermore, we explore the application of Template Theory to collaboration. An exper...
Stephen C. Hayne, C. A. P. Smith, Leo R. Vijayasar...