Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Abstract. This work proposes an approach for managing multimedia information associated to 3D environments navigated by the user. The influence of context (location, user profile, ...
The importance of assumptions in Requirements Engineering has long been recognised. However, to the best of our knowledge, no quantitative models for the relation between assumpti...
Andriy V. Miranskyy, Nazim H. Madhavji, Matthew Da...
Abstract. Most existing ontology mapping tools do not provide exact mappings. Rather, there is usually some degree of uncertainty. We describe a framework to improve existing ontol...
Satisfiability problem is an NP-complete problem that finds itself or its variants in many combinatorial problems. There exist many complete algorithms that give successful results...