Packaging software assets for reuse can improve the potential for others to adopt the software. Packaging the software with appropriate documentation and other resources can facil...
Ryan Gerard, Robert R. Downs, James J. Marshall, R...
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
We present a case study about the application of the inductive database approach to the analysis of Web logs. We consider rich XML Web logs ? called conceptual logs ? that are gen...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Robe...
Technology allows users to interact with a wide variety of information and services. However, more and more users need to integrate complementary content to previously accessed in...
With the growing popularity of Web services, an increasing number of Web services have been integrated into and used by complex service oriented systems. As a result, the manageme...
Martin Treiber, Hong Linh Truong, Schahram Dustdar