Abstract. It could be advantageous in many situations for an adaptive hypermedia system to have information about the cognitive load that the user is currently experiencing. A lite...
Designing an optimal overlay communication network for a set of processes on the Internet is a central problem of peer-to-peer (P2P) computing. Such a network defines membership a...
We propose a template-based runtime invalidation approach for maintaining cache consistency in database-generated web contents. In our approach, the invalidator sits between a web...
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...