Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
XPath is a simple language for navigating an XML-tree and returning a set of answer nodes. The focus in this paper is on the complexity of the containment problem for various frag...
Abstract—In this work we explore the feasibility of implementing infrastructure-to-vehicle (I2V) communication through the UMTS infrastructure. We identify the problems that aris...
The increasing availability of multimedia (MM) resources, Web services as well as content, on the Web raises the need to automatically discover and process resources out of distrib...
Stefan Dietze, Neil Benn, John Domingue, Alex Conc...