Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
Recent developments in philosophy, linguistics, developmental psychology and arti cial intelligence make it possible to envision a developmental path for an arti cial agent, groun...
Paul R. Cohen, Marc S. Atkin, Tim Oates, Carole R....
We propose a collaborative forensics framework to trace back callers of VoIP services in a multi-network environment. The paper is divided into two parts. The first part discusses ...
—Fear of crime is a central topic in the field of victimization. In particular, criminologists are interested in the environmental structures and cues that generate fear. Resear...
Andrew J. Park, Valerie Spicer, Monique Guterres, ...
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. The power of data mining tools to extract hidden information that can...