This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
The problem of dividing a sequence of values into segments occurs in database systems, information retrieval, and knowledge management. The challenge is to select a finite number ...
Data Warehouses (DWs) use an omnipresent time dimension for keeping track of changes in measure values. However, this dimension cannot be used to model changes in other dimensions...
This article proposes a research agenda aimed at enabling optimized testing and analysis processes and tools to support component-based software development communities. We hypoth...