As the amount of available data continues to increase, more and more effective means for discovering important patterns and relationships within that data are required. Although t...
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
We introduce a novel approach to combining rankings from multiple retrieval systems. We use a logistic regression model or an SVM to learn a ranking from pairwise document prefere...
The real needs of end users of software technology are often neglected until it is too late. An approach is outlined that puts people before technology, and investigates the real ...