End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
The central idea in reference modeling is the reutilization of the business knowledge contained in reference models for the construction of specific information models. The orient...
Service oriented access in a multi-application, multi-access network environment poses interesting research challenges. One of these challenges refers to cross-layer interoperabil...
The advent of networking technologies and high performance transport protocols facilitates the service of storage over networks. However, they pose challenges in integration and i...
Jiesheng Wu, Pete Wyckoff, Dhabaleswar K. Panda, R...
Spoken dialogue systems can be considered knowledge-based systems designed to interact with users using speech in order to provide information or carry out simple tasks. Current s...