— Current web applications use HTTP (Hyper Text Transfer Protocol) over TCP (Transmission Control Protocol) to retrieve objects over the Internet. SCTP (Stream Control Transmissi...
During the last decade, sequential pattern mining has been the core of numerous researches. It is now possible to efficiently discover users’ behavior in various domains such a...
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Many companies have found out the hard way that successful ecommerce requires more than a flashy web presence. Existing business processes must be seamlessly integrated with the n...
Monique H. Jansen-Vullers, Mariska Netjes, Hajo A....
With the exponential growth of Web 2.0 applications, tags have been used extensively to describe the image contents on the Web. Due to the noisy and sparse nature in the human gene...