Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Traditional approaches to recommender systems have not taken into account situational information when making recommendations, and this seriously limits the relevance of the resul...
These last years, the evolution of nomadic terminals and mobile networks has yield to the development of the ubiquitous computing. In this context, actual query evaluation and opt...
A number of key areas in IP network engineering, management and surveillance greatly benefit from the ability to dynamically identify traffic flows according to the applications re...
Sebastian Zander, Thuy T. T. Nguyen, Grenville J. ...
“W3QL: A Query Language for the WWW”, published in 1995, presented a language with several distinctive features. Employing existing indexes as access paths, it allowed the sel...