This paper argues for a return to fundamentals as we enter the new millennium. It argues that the field of Information Systems should no longer be distracted from its natural locu...
Both software applications and their development environment are becoming more and more distributed. This trend impacts not only the way software computes, but also how it looks. T...
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Multispectral printer characterization requires an effective model to map printer input digital counts into reflectance spectra and vice versa. This paper presents a novel strateg...
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...