Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
We address name search for transliterated Arabic given names. In previous work, we addressed similar problems with English and Arabic surnames. In each previous case, we used a va...
CoMex (Coordination Mechanism) is a system to coordinate the execution of tasks accessing coordinable entities. It uses coordination rules to describe the temporal and logical orde...
A vertically integrated market consists of potentially competing companies who supply each other with products and services. Information technology can be employed to improve the b...
We illustrate that Web searches can often be utilized to generate background text for use with text classification. This is the case because there are frequently many pages on the...