When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Our research and development activities in digital libraries raised relevant features in supporting Web information integration. Underlain by an in house multi-agent based architec...
Tarcisio Lima, Amit P. Sheth, Naveen Ashish, Mukes...
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
The massive amount of statistical and text data available from government agencies has created a set of daunting challenges to both research and analysis communities. These proble...
Work ow management systems aim to automate the execution of business processes. One of the objectives of the work ow systems is to include the already existing applications such a...
Pinar Karagoz, Sena Nural Arpinar, Pinar Koksal, N...