One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
We propose a conceptually and technically neat method to identify known semantic patterns close to a novel pattern. This occurs in the context of a system to acquire knowledge inc...
Sylvain Delisle, Terry Copeck, Stan Szpakowicz, Ke...
: Swift and frictionless launches of new products are a decisive capability of future telecommunication providers, especially in an all-IP production environment. These processes a...
Workflow management systems are increasingly used to assist the automation of business processes that involve the exchange of documents, information, or task execution results. Re...
This paper describes a model that defines the attributes of domestic systems that lead to system dependability and a user-oriented specification method for support systems based...