Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
—For a large and evolving software system, the project team could receive a large number of bug reports. Locating the source code files that need to be changed in order to fix th...
In recent years, several information retrieval methods using information about the Web-links are developed, such as HITS and Trawling. In order to analyze the Web-links dividing i...
Effective information gathering on the WWW is a complex task requiring planning, scheduling, text processing, and interpretation-style reasoning about extracted data to resolve in...
Victor R. Lesser, Bryan Horling, Frank Klassner, A...
: This article deals with enterprise interoperability in order to propose lines of research about information system design in a collaborative context. The static and dynamic dimen...