We are witnessing two trends in Web content access: (a) increasing amounts of dynamic and personalized Web content, and (b) a significant growth in “on-the-move” access using...
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Research and products for the integration of heterogeneous legacy source databases in data warehousing have addressed numerous data quality problems in or between the sources. Suc...
Matthias Jarke, Christoph Quix, Guido Blees, Dirk ...
— Due to the ongoing massive growth of the global Internet, the rising integration of Voice over IP (VoIP) services and the Fixed Mobile Convergence (FMC), the IPv6 protocol and ...
Thomas Hoeher, Martin Petraschek, Slobodanka Tomic...