Early question and answering (QA) systems focused on keyword search among documents for answers. However, such systems can only answer fact-based questions. It becomes clear that ...
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
The development of ontologies involves continuous but relatively small modifications. Existing ontology reasoners, however, do not take advantage of the similarities between diffe...
Bernardo Cuenca Grau, Christian Halaschek-Wiener, ...
— Classical tracking methods are often insufficient when dealing with complex scenarios. In order to solve tracking errors, innovative techniques based on the use of information ...
New mobile computing technologies and the increasing use of portable devices have pushed the development of the so-called context-aware applications. This new class of applications...