In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome trends surface.… (More)
The authors are extremely grateful for the support and cooperation of the Microelectronics and Computer Technology Corporation (MCC) and of its software designers who voluntarily participated in this… (More)
An oxygen plasma sustained at 13.56 MHz in a standardized reactor with a planar induction coil was used for biological decontaminationexperiments. Optical emission, mass spectrometry, Langmuir probe,… (More)
In this paper, we propose a non-blind watermarking scheme for digital images based on singular value decomposition (SVD) and particle swarm optimization (PSO) in the DWT domain. Here, we are… (More)
The prevailing approach to cyber security continues to be the implementation of controls—technical, formal, and informal. We have seen little departure from a fundamentally preventive strategy. The… (More)
Most current conceptualizations of the use of information technology (IT) to capture, preserve and use organizational memory (OM) are based on hard data sources, such as databases and knowledge… (More)
Longitudinal use of a collaborative writing sofhvare was observed to identify patterns of adoption. Use of the software was limited and patterns of adoption inconsistent with expectations. In this… (More)
—In this paper, a new technique for keyframe extraction and shot boundary detection is proposed. The proposed technique uses Eigen values for measuring the dissimilarity between the consecutive… (More)