Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Conferences on applied research require more complicated taxonomy than traditional organization of conferences by tracks. A topic of a paper, submitted to a conference on the appl...
Antonina Kloptchenko, Barbro Back, Hannu Vanharant...
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
One of the challenges faced by network management systems is the increasing need for consistent management of physical network equipment. We propose a solution where equipment is m...
Krzysztof Miksa, Marek Kasztelnik, Pawel Sabina, T...
This paper presents our work on the integrated use of simulation tools in real time for participatory occupational ergonomic studies. The focus of this paper is a synergistic syst...
Shaikh Imtiyaz, Uma Jayaram, Sankar Jayaram, Craig...