Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spamme...
We still know little of why strategy processes often involve participation problems. In this paper, we argue that this crucial issue is linked to fundamental assumptions concernin...
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
– Better understanding the document logical components is crucial to many applications, e.g., document classification or data integration. As the development of digital libraries...