This paper seeks to develop an integrated perspective on knowledge management (KM) project measurement. Based on a review of the existing literature, a theoretical framework which...
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
This paper describes the development of a predictive model for corporate insolvency risk in Australia. The model building methodology is empirical with out-ofsample future year te...
Abstract. As software systems become bigger and more complex, software developers need to cope with a growing amount of information and knowledge. The knowledge generated during th...