Despite numerous proposals for its creation, the semantic web has yet to achieve widespread adoption. Recently, some researchers have argued that participation in the semantic web...
Luke McDowell, Oren Etzioni, Steven D. Gribble, Al...
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Information requirement elicitation (IRE) is a context-aware and personalized wireless web service to elicit user information requirements through interactive choice prompts. The ...
Jun (John) Sun, Hoh Peter In, Kuncara Aji Sukasdad...
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
It has been demonstrated that the use of suitable metaphors in the user service interface can have a dramatic effect on the way in which the user perceives the services, depending ...