Truly successful models for component-based software development continue to prove elusive. One of the few is the use of operating system, database and similar programs in many sy...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Many different ranking algorithms based on content and context have been used in web search engines to find pages based on a user query. Furthermore, to achieve better performance ...
In this paper, we present the application of evolutionary optimization methods to a demanding, industrially relevant engineering domain, the three-dimensional optimization of gas ...
Incorporation into construction engineering and management curricula of tasks that improve the abilities of students to manage the complex dynamics, pressures, and demands of cons...