Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
The rapid development of the Internet and of distributed computing has led to a proliferation of online service providers such as digital libraries, web information sources, electr...
We outline the application of a framework for managing information quality (IQ) in proteomics. The approach allows scientists to define the quality characteristics that are of im...
Alun D. Preece, Binling Jin, Paolo Missier, Suzann...
Weblog (usually shortened as blog) has gained its popularity lately. There are about 70,000 new blogs a day and about 29,100 blog updates an hour. As an emerging blogging phenomen...
Pujianto Cemerlang, Joo-Hwee Lim, Yilun You, Jun Z...
The creation of a development process is a challenging task. The application, customization and refinement of generic process models into fine-grained process steps suitable for a...