Design patterns document good design solutions to a recurring problem in a particular context. They are typically modeled using UML. In practice, however, pattern-related informat...
: In an urban area, the demand for taxis is not always matched up with the supply. This paper proposes mining historical data to predict demand distributions with respect to contex...
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
With the Web 2.0 trend and its participation of end-users more and more data and information services are online accessible, such as web sites, Wikis, or web services. The integra...
We propose a mobile Web map interface that is based on a metaphor of the Wired Fisheye Lens. The interface was developed by using an improved fisheye views (Focus+Glue+Context map...