The permeation of technology into our daily lives has resulted in new types of criminal activity and new ways of committing old crimes. As with traditional crime, fundamental to t...
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
In this paper the performance of OVSF and NOVSF codes in WCDMA are evaluated by calculating their blocking probability and plotting graphs between blocking probability and new call...
Interoperability among systems using different term vocabularies requires mappings between them. Matching applications generate these mappings. When the matching process utilizes ...
Deborah L. McGuinness, Pavel Shvaiko, Fausto Giunc...
The dot-com boom in the late 1990s attracted vast numbers of undergraduate students into the field of Information Systems (IS) with the promise of being the next "big thing&q...