To operate reliably in environments where interaction with an operator is infrequent or undesirable, an autonomous system should be capable of both determining how to achieve its ...
William Heaven, Daniel Sykes, Jeff Magee, Jeff Kra...
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
E-learning is fueling efforts to integrate distributed learning systems in organisations. This paper provides a case study of integrated work and learning processes in a customer ...
Abstract. This paper describes a pedagogical pattern for cross-cultural language learning and its application in a case study involving learners in Australia and China. The pattern...
Carsten Ullrich, Kerstin Borau, Scott Grant, Danie...