Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Abstract. Domain ontologies very rarely model verbs as relations holding between concepts. However, the role of the verb as a central connecting element between concepts is undenia...
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...