Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
The desideratum for the concept of a semiotic web is proposed. It combines both the recent semantic web and the pragmatic web initiatives but surpasses them in being faithful to C...
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
Simulation models are useful to predict and understand the impact of changes to a manufacturing system. Typical factory simulation models include the parts being manufactured in t...
Jeffrey W. Herrmann, Brian F. Conaghan, Laurent He...
This paper describes our work on parsing Turkish using the lexical-functional grammar formalism. This work represents the rst e ort for parsing Turkish. Our implementation is based...