An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
Through as an important part of service-oriented system architecture, service retrieval receives much attention from industry and academia and many methods have been proposed, the...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...
Expressive knowledge representations with flexible semantic similarity measures are central for the functioning of semantic information retrieval, information integration, matchmak...
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...