An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
In this paper we describe and evaluate a Question Answering (QA) system that goes beyond answering factoid questions. Our approach to QA assumes no restrictions on the type of que...
Human interaction occurs always in a specific context and in a particular environment, and a common knowledge base about them is essential for understanding each other. By immersi...
Quality aspects become increasingly important when business process modeling is used in a large-scale enterprise setting. In order to facilitate a storage without redundancy and an...
Boudewijn F. van Dongen, Remco M. Dijkman, Jan Men...
This paper proposes the use of an interaction modeling language called MoLIC to graphically represent scenarios as an additional resource in software development. MoLIC brings hum...