Although various methods for the evaluation of intelligent systems have been proposed in the past, almost no techniques are present that support the manual inspection of knowledge...
The trend towards highly specialized solution providers cooperatively offering configurable products and services to their customers requires the extension of current (standalone)...
Alexander Felfernig, Gerhard Friedrich, Dietmar Ja...
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
The long-term goal of Project Halo is to build an application called Digital Aristotle that can answer questions on a variety of science topics and provide user and domain appropr...
Ken Barker, Vinay K. Chaudhri, Shaw Yi Chaw, Peter...
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...