— This paper addresses the problem of managing a wireless sensor network with mobile managers. The mobile managers should be able to create their connectivity to the nodes they m...
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
The design and maintenance of ontologies is a complex social collaborative activity, and this is true especially for semantic-web ontologies. On the one hand, such activity calls ...
Aldo Gangemi, Jos Lehmann, Valentina Presutti, Mal...
MDM is a tool that enables the users to de ne schemes of di erent data models and to perform translations of schemes from one model to another. These functionalities can be at the...
Abstract. The most popular data mining techniques consist in searching databases for frequently occurring patterns, e.g. association rules, sequential patterns. We argue that in co...
Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzew...