Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Business models on the basis of digital content require sophisticated descriptions of that content, as well as service-oriented carrier architectures that allow to negotiate and en...
Wernher Behrendt, Aldo Gangemi, Wolfgang Maass 000...
We describe the MusicMiner system for organizing large collections of music with databionic mining techniques. Low level audio features are extracted from the raw audio data on sh...
Abstract. This paper presents a set of mechanisms oriented to incorporate social information into the decision taking of task-oriented 3DIVA. The aim of this approach is to integra...
Francisco Grimaldo, Miguel Lozano, Fernando Barber...