A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
This paper outlines the benefits of adopting serviceoriented architectures at the level of communications between resource-constrained embedded devices, in particular for industri...
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
: Web usage mining has been much concentrated on the discovery of relevant user behaviours from Web access record data. In this paper, we present WebUser, an approach to discover u...