This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
We describe a social visualization system that monitors the vocal arousal levels of the participants in a simulated twoparty employment negotiation. In a 3x2 factorial experiment ...
Michael Nowak, Juho Kim, Nam Wook Kim, Clifford Na...
Background: Popular methods to reconstruct molecular phylogenies are based on multiple sequence alignments, in which addition or removal of data may change the resulting tree topo...
Olivier Bastien, Philippe Ortet, Sylvaine Roy, Eri...
A key challenge for dynamic Web service selection is that Web services are typically highly configurable and service requesters often have dynamic preferences on service configura...
Database performance can be greatly affected by environmental and internal dynamics such as workloads and system configurations. Existing strategies to maintain performance under ...
Yi-Cheng Tu, Song Liu, Sunil Prabhakar, Bin Yao, W...