To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
In this paper, we investigate how existing social networks can benefit P2P data networks by leveraging the inherent trust associated with social links. We present a trust model t...
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Abstract. Language-based editing systems have the potential to become a practical, central, and powerful part of every software engineer's toolkit, but progress has been limit...
It seems that actual software tools utilizing Computer-Mediated Communication mechanisms -like messaging or chat systems- do not help young students to learn good grammar skills. ...