When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Giving effective help is an important collaborative skill that leads to improved learning for both the help-giver and help-receiver. Adding intelligent tutoring to student interact...
Nowadays, the information overload highlights the importance of personalization systems providing services according to users' interests and needs, as expressed by their User ...
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...