When human tutors engage in dialogue, they freely exploit allaspects of the mutually known context, including the previous discourse. Utterances that do not draw on previous disco...
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Abstract. This paper presents an approach aimed at fully exploiting semantics of supply/demand descriptions in B2C and C2C e-marketplaces. Distinguishing aspects include logic-base...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
Explaining how engineering devices work is important to students, engineers, and operators. In general, machine generated explanations have been produced from a particular perspec...
This paper reports the results from an action research project which studies the benefits of documenting the evolution and the rationale for the evolution of a requirements specif...