In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
In this paper we investigate the use of Latent Semantic Analysis (LSA), Critiquing Systems, and Knowledge Building to support computerbased teaching of English composition. We have...
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
The early Web was hailed for being easy to use, and what is more important, giving people a chance to participate in its growth. The Web3D was believed to have potential to be the...
Jacek Jankowski, Izabela Irzynska, Bill McDaniel, ...