Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
This paper investigates the quality of information and intelligence in the United Kingdom’s (UK) police intelligence units with a particular emphasis on the role of paper-based ...
The Context Modelling Language (CML), derived from Object Role Modeling (ORM), is a powerful approach for capturing the pertinent object types and relationships between those type...
It is well known that the evolution of cooperative behaviour is dependant upon certain environmental conditions. One such condition that has been extensively studied is the use of ...