In this paper, an agent architecture is proposed that can be used to integrate pre-existing components that provide the domain dependent agent functionality. The key integrating fe...
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Effort distribution by phase or activity is an important but often overlooked aspect compared to other steps in the cost estimation process. Poor effort allocation is among the ma...
Ye Yang, Mei He, Mingshu Li, Qing Wang, Barry W. B...
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations...
M. Patrick Collins, Timothy J. Shimeall, Sidney Fa...
Social software and web 2.0 live on the fact that people want to share and collaborate. This feeling of connecting with each other as well as helping and sharing information can be...