Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
The current research in granular computing is dominated by set-theoretic models such as rough sets and fuzzy sets. By recasting the existing studies in a wider context, we propose ...
In this work we discuss a number of issues for the design of hypertext systems in an actor-based model of computation. We examine how the "traditional" basic concepts whi...
Exploratory ad-hoc queries could return too many answers ? a phenomenon commonly referred to as "information overload". In this paper, we propose to automatically catego...
Today, most mobile applications use geo-referenced points of interest (POIs) on location-based maps to call the user’s attention to interesting spots in the surroundings. The pre...