In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
The software architecture of distributed systems is about to change due to new requirements of modern mobile devices. New network techniques, like ad-hoc radio communication or pee...
Wolfgang Beer, Volker Christian, Alois Ferscha, La...
We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user's activity) and propose ...
Cristian Hesselman, Andrew Tokmakoff, Pravin Pawar...
This paper focuses on the central role played by lexical information in the task of Recognizing Textual Entailment. In particular, the usefulness of lexical knowledge extracted fr...
We present an approach to exploit social and spatio-temporal context in order to improve information dissemination in dynamic largescale public spaces. We illustrate it by applying...
Nasim Mahmud, Petr Aksenov, Ansar-Ul-Haque Yasar, ...