With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that...
K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas C...
Arti cial neural networks are computer software or hardware models inspired by the structure and behavior of neurons in the human nervous system. As a powerful learning tool, incr...
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
BSCW [8] and Groove [10] have become the two defacto standards for collaboration over the Internet. They offer a wealth of functionalities, support a variety of possible collabora...