—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
We consider the problem of maximizingthe number of jobs completed by their deadlinein an online single processor system where the jobs are preemptable and have release times. So i...
Interactive analysis of datacube, in which a user navigates a cube by launching a sequence of queries is often tedious since the user may have no idea of what the forthcoming query...
In this paper, we propose the use of Semantic Web technologies to bridge the gap between authoring systems and authors. The core part of our solution is the ontology-based framewo...
Recommendation systems often use association rules as main technique to discover useful links among the set of transactions, especially web usage data – historical user sessions....