Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
BreakingStory is an interactive system for visualizing change in online news. The system regularly collects the text from the front pages of international daily news web sites. It...
Jean Anne Fitzpatrick, James Reffell, Moryma Aydel...
Motivated by realistic sensor network scenarios that have mis-informed nodes and variable network topologies, we propose a fundamentally different approach to routing that combine...
Christopher L. Barrett, Stephan Eidenbenz, Lukas K...