Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Abstract. AMFIBIA is a meta-model that formalizes the essential aspects and concepts of business process modelling. Though AMFIBIA is not the first approach to formalizing the aspe...
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
AJAX (Asynchronous JavaScript and XML) defines a new paradigm for writing highly interactive web applications. Prominent web sites such as Google Maps have made AJAX popular. Writi...
Over the past two years, horrific disasters such as the Asian Tsunami, Hurricane Katrina, and the Pakistan Earthquake have demonstrated the critical need for effective technologic...
Brian M. Tomaszewski, Alan M. MacEachren, Scott Pe...