All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the r...
Adam Barth, Benjamin I. P. Rubinstein, Mukund Sund...
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Abstract. This article considers the link between theory and practice in agentoriented programming. We begin by rigorously defining a new formal specification language for autono...
The empirical findings from an organization, which adopted and implemented ERP, are presented. The focus of this empirical research was to understand the nature and processes of k...
Jimmy C. Huang, Sue Newell, Shan Ling Pan, Robert ...