Due to the inherent complexity of building highly-interactive and personalized web applications, the development of a web-based travel advisory system can be a costly and timecons...
Dietmar Jannach, Markus Zanker, Markus Jessenitsch...
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
This paper presents a specifically database-inspired approach (called DOGMA) for engineering formal ontologies, implemented as shared resources used to express agreed formal semant...
—Spatial augmented reality using controllable projector-camera-systems to project onto objects directly, or Projected Reality as we call it, offers the possibility to augment obj...
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...