Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
—The vision of the Semantic Web is to lift the current Web into semantic repositories where heterogeneous data can be queried and different services can be mashed up. Ontology or...
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their pote...
Anne Durand, Pierre Drap, Elise Meyer, Pierre Grus...
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
—As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommend...