Real-world data is known to be imperfect, suffering from various forms of defects such as sensor variability, estimation errors, uncertainty, human errors in data entry, and gaps ...
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Abstract. This paper addresses several issues related to the use of conceptual modeling to support serviceoriented, advanced information systems. It shows how conceptual modeling o...
The development of large software systems demands intensive cooperation among multiple project team members with different responsibilities. The development process is often distr...
Abstract. Reviews and review based rankings are widely used in recommendation systems to provide potential customers quality information about selected products. During the last ye...