Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Design by contract is a practical methodology for developing code together with its specification. The contract consists of class invariants and method preand postconditions. As ...
Maayan Goldstein, Yishai A. Feldman, Shmuel S. Tys...
Wearable technology is omnipresent to the user. Thus, it has the potential to be significantly disruptive to the user’s daily life. Context awareness and intuitive device interf...
Lucy E. Dunne, Sarah Brady, Richard Tynan, Kim Lau...
This paper presents an approach for building consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent has its own conceptualizat...
This paper describes a discussion-bot that provides answers to students’ discussion board questions in an unobtrusive and humanlike way. Using information retrieval and natural ...
Donghui Feng, Erin Shaw, Jihie Kim, Eduard H. Hovy