Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
The use of new information technology impacts individual work as well as the whole organization. This paper illuminates some preliminary findings from an ongoing study about impac...
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
What role should evaluation play in the development of natural language generation () techniques and systems? In this paper we describe what is involved in natural langua...
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...