Bond University

Displaying 1-4 of 4 results

  • White Papers // Sep 2011

    Ddnfs: A Distributed Digital Notary File System

    Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on "Faceless", solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: who can trust the authors to introduce one to and vouch for...

    Provided By Bond University

  • White Papers // Aug 2011

    Adapting IT Governance Frameworks using Domain Specific Requirements Methods: Examples from Small & Medium Enterprises and Emergency Management

    IT Governance methods and frameworks have been applied in most large for-profit organizations since these enterprises realize the benefits of IT Governance for their business. However, former research and the authors' own surveys show that frameworks such as ITIL and COBIT are not very well established in Small and Medium...

    Provided By Bond University

  • White Papers // Aug 2010

    Asymptotic Analysis of Instant Messaging Service With Relay Nodes

    In this paper, the authors provide complete end-to-end delay analyses including the relay nodes for instant messages. Message Session Relay Protocol (MSRP) is used to provide congestion control for large messages in the Instant Messaging (IM) service. Large messages are broken into several chunks. These chunks may traverse through a...

    Provided By Bond University

  • White Papers // Oct 2008

    Persuasion In Negotiation And Mediation

    This paper endeavors to provide a framework for common patterns of behavior and persuasion, observed anecdotally in high conflict negotiations in civil and family disputes, often including legal representatives. It sets out: Some introductory boundaries to the topic of 'persuasion' A composite model of a persuasive lawyer - negotiator; basic...

    Provided By Bond University

  • White Papers // Aug 2011

    Adapting IT Governance Frameworks using Domain Specific Requirements Methods: Examples from Small & Medium Enterprises and Emergency Management

    IT Governance methods and frameworks have been applied in most large for-profit organizations since these enterprises realize the benefits of IT Governance for their business. However, former research and the authors' own surveys show that frameworks such as ITIL and COBIT are not very well established in Small and Medium...

    Provided By Bond University

  • White Papers // Oct 2008

    Persuasion In Negotiation And Mediation

    This paper endeavors to provide a framework for common patterns of behavior and persuasion, observed anecdotally in high conflict negotiations in civil and family disputes, often including legal representatives. It sets out: Some introductory boundaries to the topic of 'persuasion' A composite model of a persuasive lawyer - negotiator; basic...

    Provided By Bond University

  • White Papers // Aug 2010

    Asymptotic Analysis of Instant Messaging Service With Relay Nodes

    In this paper, the authors provide complete end-to-end delay analyses including the relay nodes for instant messages. Message Session Relay Protocol (MSRP) is used to provide congestion control for large messages in the Instant Messaging (IM) service. Large messages are broken into several chunks. These chunks may traverse through a...

    Provided By Bond University

  • White Papers // Sep 2011

    Ddnfs: A Distributed Digital Notary File System

    Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on "Faceless", solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: who can trust the authors to introduce one to and vouch for...

    Provided By Bond University