The re-use of a model by someone else than the original developer is still an open challenge. This paper presents composition structures and interface descriptions for discreteeve...
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
In this paper we describe I-Subdue, an extension to the Subdue graph-based data mining system. I-Subdue operates over sequentially received relational data to incrementally discov...
Jeffrey Coble, Diane J. Cook, Lawrence B. Holder, ...
Using a knowledge-based theory of the firm within the larger framework of resource-based theory, this ongoing study examines how firm knowledge structures are disrupted under diff...