Abstract. Studying and analysing the collaborative behaviour of online learning teams and how this behaviour is related and affects task performance is a complex process. This pap...
Thanasis Daradoumis, Fatos Xhafa, Joan Manuel Marq...
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
What is the "high level view" of data on the Web that can be traced down within W3C's rich roadmap of technologies? What the relationships between the "big need...
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to detect unso...