It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
A massive rise in the number and expenditure of pathology ordering by general practitioners (GPs) concerns the government and attracts various studies with the aim to understand a...
Zoe Yan Zhuang, Rasika Amarasiri, Leonid Churilov,...
Many different task modeling methods exist. In this paper, we discuss 1) ingredients common to most task models, 2) how task modeling relates to the design of user interfaces, and ...
Martijn van Welie, Gerrit C. van der Veer, Anton E...
Vague spatial information such as “x is located at walking distance of y” is abundant on the web. In this contribution, we propose a framework to represent such spatial inform...
Steven Schockaert, Martine De Cock, Etienne E. Ker...