Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
In this paper we take a view from the bottom to RDF(S) reasoning. We discuss some issues and requirements on reasoning towards effectively building Semantic Web Pipes, aggregating ...
Christian Morbidoni, Axel Polleres, Giovanni Tumma...
The INESC Porto group has participated in the search task (automatic and interactive). Our approach combines high-level features (the 39 concepts of the LSCOM-Lite set) with low-l...
Catalin Calistru, Cristina Ribeiro, Gabriel David,...
In this paper we present concepts for integrating glyphs into volumetric data sets. These concepts have been developed with the goal to make glyphbased visualization of multimodal...
Timo Ropinski, Michael Specht, Jennis Meyer-Sprado...
—People make and use tools. Many information technology tools, applying computer science research, powerfully influence human behaviour. Some questions about human behaviour can ...