Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
We studied the role of the competence of an interface agent that helped users to learn and use a text editor. Participants in the study made a set of changes to a document with th...
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...
Eden is a parallel functional language extending Haskell with processes. This paper describes the implementation of an interface between the Eden language and the Maple system. The...
The notion of time granularity comes into play in a variety of problems involving time representation and management in database applications, including temporal database design, t...