Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...
Although evolutionary algorithms (EAs) are widely used in practical optimization, their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime ar...
—In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning cons...
Dimitrios A. Koutsomitropoulos, Georgia D. Solomou...
The effectiveness of support provided to virtual communities depends strongly on what we know about a particular community of people and in what areas the community needs support....
While distributed, heterogeneous collections of computers (“Grids”) can in principle be used as a computing platform, in practice the problems of first discovering and then co...
Chuang Liu, Lingyun Yang, Ian T. Foster, Dave Angu...