Potentially one of the most significant opportunities for enterprise integration is the recent development and advancement of agent based systems. However, before agents can be us...
Elizabeth A. Kendall, Margaret T. Malkoun, Chong H...
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
We describe our participation in the 2009 CLEF-IP task, which was targeted at priorart search for topic patent documents. Our system retrieved patent documents based on a standard...
Management applications are sensitive to changes in application and system configuration. This coupling makes it difficult and expensive to develop management applications and kee...
Asham El Rayess, Vidar Vetland, Jerome A. Rolia, J...
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...