Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Abstract. Recently, the distributed real-time services are developing in distributed object computing environments in a way that can support a new programming paradigm of the distr...
Su-Chong Joo, Sung-Kwun Oh, Chang-Sun Shin, Jun Hw...
In this paper we present FormSys, a Web-based system that service-enables form documents. It offers two main services: filling in forms based on Web services’ incoming SOAP me...
Ingo M. Weber, Hye-Young Paik, Boualem Benatallah,...
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
In September of 1998, the College of Engineering at the University of Massachusetts Dartmouth piloted an innovative, integrated, first-year curriculum. It dramatically changed 31 ...
Paul J. Fortier, Emily Fowler, Raymond N. Laoulach...