In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Users of Institutional Repositories and Digital Libraries are known by their needs for very specific information about one or more subjects. To characterize users profiles and offe...
Marisa R. De Giusti, Gonzalo L. Villarreal, Agust&...
Micro-blogs are a challenging new source of information for data mining techniques. Twitter is a micro-blogging service built to discover what is happening at any moment in time, a...
: Slow Intelligence Systems are general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptatio...
Shi-Kuo Chang, Emilio Zegarra, Chia Chun Shih, Tin...