Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
In this paper, we proposed a unified strategy to combine query log and search results for query suggestion. In this way, we leverage both the users' search intentions for pop...
In the past few years, Iranian universities have embarked to use e-learning tools and technologies to extend and improve their educational services. After a few years of conducting...
Software architecting is a highly knowledge-intensive process demanding and producing a large and rich amount of information. To remain competitive, companies and organizations wo...
Patricia Lago, Paris Avgeriou, Rafael Capilla, Phi...
- This paper presents a technique of evolutionary design for plants in virtual worlds, inspired from Richard Dawkins' adaptive walks within the space of biomorph structures. T...