Following from part I, which presents a retrospective on optimization, we focus here on areas that are recent active research topics and are likely to strongly influence the futur...
: We have constructed a set of ontologies modelled on conceptual structures elicited from several domain experts. Protocols were collected from various experts who advise on the se...
: In order to develop context-aware applications for ubiquitous computing environments we have defined an MDA approach that defines three layers of models. The first layer captures...
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
Abstract. Ontologies are used for sharing information and are often collaboratively developed. They are adapted for different applications and domains resulting in multiple version...