A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Web service-based workflow management systems have garnered considerable attention for automating and scheduling dependent operations. Such systems often support user preferences,...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...
Although user behavior in the popular Facebook social network site has been intensely investigated since the site came live in 2004, we know little about users' emotions and ...
Corina Sas, Alan J. Dix, Jennefer Hart, Ronghui Su
In this paper, we propose a Joint Source-Network error control coding (JSNC) scheme which efficiently integrates scalable video coding, error control coding and overlay infrastruc...
Yufeng Shan, Shivkumar Kalyanaraman, John W. Woods...
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...