XML data evolution has recently gained much interest in both research and practice. However, most of the existing works deal with separate aspects of the problem such as evolution...
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
—In this paper, we propose knowledge-chunk based techniques for instance matching and mapping discovery of Semantic Web resources. Knowledge chunks provide a synthetic representa...
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
A huge amount of schemas are expressed within outdated schema languages which are restricted concerning expressiveness, extensibility, readability, and understandability. Consequen...
Idiopathic chronic pain disorders constitude a large, clinically important health care problem that urgently needs deeper pathophysiological insight. The understanding which brain ...
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
We propose a collaborative reputation-based voice spam filtering framework. Our approach uses the cumulative online duration of a VoIP user to derive his reputation value. And we l...
Various retrieval models have been developed and analyzed so far, but less research aims to an integration of the different models within a common framework. This paper introduces ...
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...