Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
We describe the development of the CaveUT system, which is a software supporting immersive virtual reality installations based on the Unreal Tournament game engine. CaveUT impleme...
Jeffrey Jacobson, Marc Le Renard, Jean-Luc Lugrin,...
“Objects-first” is an increasingly popular strategy for teaching object-oriented programming by introducing the concepts of objects, classes, and instances before procedural e...
Sally H. Moritz, Fang Wei, Shahida M. Parvez, Glen...
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...