By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
In this study, we draw on network centrality concepts and coordination theory to understand how project team members interact when working towards a common goal. A text-mining app...
Heterogeneity is a challenge to overcome in the design of embedded systems. We presented in the recent past a theory for the composition of heterogeneous components based on tagge...
This paper addresses ways in which theorizing gender may be important in forming an understanding of the topic of emancipation which is central to the new critical information sys...
As we devise more complicated prior distributions, will inference algorithms keep up? We highlight a negative result in computable probability theory by Ackerman, Freer, and Roy (...