Recently, many video sharing sites provide external links so that their video or audio contents can be embedded into external web sites. For example, users can copy the embedded U...
Abstract—Due to its large scale and constrained communication radius, a wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet along a sequence...
Jiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Merging and integrating different conceptual models which have been developed by domain experts and analysts with dissimilar perspectives on the same issue has been the subject of...
— All large vendors of standard business software have announced to move to service oriented architecture. They claim benefits for their customers with regard to agility and ope...