—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
For the evaluation of web sites a multitude of metrics are available. Apart from general statistical measures, success metrics reflect the degree to which a web site achieves its...
Carsten Stolz, Maximilian Viermetz, Michal Skubacz...
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Relation extraction is the task of finding semantic relations between entities from text. The state-of-the-art methods for relation extraction are mostly based on statistical lea...