The re-use of a model by someone else than the original developer is still an open challenge. This paper presents composition structures and interface descriptions for discreteeve...
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Currently, Web services are available on Internet in a simple and easy way to use. However, a single service can not respond to a predetermined request by user. Thus, it is necessa...
Since the approval of IEEE LOM Draft Standard and the advance of network-driven learning technology, a large number of resource database constructors, content developers and learn...