Children who are active on the internet are performing significant design and programming activity without realising it, in the course of hacking little animations, game scripts a...
Abstract. This paper presents a method for making metadata conforming to heterogeneous schemas semantically interoperable. The idea is to make the knowledge embedded in the schema ...
Abstract. A novel text watermarking algorithm is presented. It combines natural language watermarking and Chinese syntax based on BP neural networks. Since the watermarking signals...
Transparent replication has been viewed as the holy grail of fault-tolerant computing. We discuss issues arising when using atomic broadcast to replicate services that are accesse...
A website can regulate search engine crawler access to its content using the robots exclusion protocol, specified in its robots.txt file. The rules in the protocol enable the site...