The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
: Web usage mining, possibly used in conjunction with standard approaches to personalization such as collaborative filtering, can help address some of the shortcomings of these tec...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...
Recently, the Software-as-a-Service (SaaS) model has been increasingly supported, becoming a major part of the new emerging cloud computing paradigms. Although SaaS exists in diff...
Marco Comerio, Hong Linh Truong, Flavio De Paoli, ...