—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
In this paper, we present a novel feedback control-based load shedding scheme for data stream processing. Firstly we apply system identification to establish a dynamic model to de...
Nonaka and his knowledge transformation model SECI revolutionized the thinking about organizations as social learning systems. He introduced technical concepts like hypertext into...
Overload management has been an important problem for large-scale dynamic systems. In this paper, we study this problem in the context of our Borealis distributed stream processin...
In this paper some research trends are presented concerning the application of fuzzy techniques to model flexible systems for the access to information on the WWW. The focus is o...