In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
We examine the problem of producing the optimal evaluation order for queries containing joins, selections, and maps. Specifically, we look at the case where common subexpressions i...
The purpose of this paper is to increase understanding about the use of embedded open source software in commercial telecommunication products. This paper applies concepts of valu...
This paper presents a phenomenological investigation of project managers' experiences with the implementation of web-based employee service systems (ESS), a domain that has w...
We present an investigation of recently proposed character and word sequence kernels for the task of authorship attribution based on relatively short texts. Performance is compare...