In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
Academics and industry professionals alike have long been interested in developing a nuanced and empirically sound typography of online gamers. Designers and engineers are aware o...
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...