The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
Abstract— Ultra wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the ...
Work processes are conducted in various contexts and they involve different tasks, interruptions, activities and actions. In all of these, tacit knowledge plays a part. Some part ...
— Within service-oriented business environments, the non-routine processing of requests requires a greater degree of social interaction and learning in order to achieve an effect...