—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
CT This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, t...