Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
The required real-time and high-rate transfers for multimedia data severely limit the number of requests that can be serviced concurrently by Video-on-Demand (VOD) servers. Resour...
We took an innovative approach to service level management for network enterprise systems by using integrated monitoring, diagnostics, and adaptation services in a service-oriente...
Haiqin Wang, Guijun Wang, Alice Chen, Changzhou Wa...
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...