Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
: Coping with complex and dynamic environments forces companies to invest in the resource knowledge for the maintenance of their operational reliability; they have to create and to...
This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...