There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Abstract. We compare two successful discriminative classification algorithms on three databases from the UCI and STATLOG repositories. The two approaches are the log-linear model ...
Daniel Keysers, Roberto Paredes, Enrique Vidal, He...
Information technologies enhance efficiency oriented organizational networks and enable creation of expertise oriented professional networks. However, whether IT-enabled efficienc...
This paper describes several incunabular assumptions that impose upon early digital libraries the limitations drawn from print, and argues for a design strategy aimed at providing ...
Gregory Crane, David Bamman, Lisa Cerrato, Alison ...
What distinguishes e-commerce from ordinary commerce? What distinguishes it from distributed computation? In this paper we propose a performative theory of e-commerce, drawing on ...