Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
E-government in South Africa has a particularly important historical and social context due to the legacy of apartheid. As a result, a ten year egovernment implementation horizon h...
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Abstract--Microblogging sites allow users to post short messages online, offering a reliable way to communicate and to spread information quickly and efficiently; moreover, they ca...