In our paper we argue that the building of trust in electronic commerce depends only partly on technical security and the knowledge of security gaps and ways of closing them. It i...
Development and maintenance of a case-base is known to be one of the most difficult problems in real-world application of case-based diagnosis systems. The complexity of large tech...
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
Engineering interactive systems for use on emerging technologies such as touch-enabled devices and horizontal displays is not straightforward. Firstly, the migration process of a ...
This paper discusses a scalable solution for integrating legacy illustrated parts drawings into a Class IV Interactive Electronic Technical Manual (IETM) [1,2]. An IETM is an inte...