Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
Many systems require data transformation – the conversion of complex data from one format to another. Most current approaches require programming, scripting bstract visual speci...
Yongqiang Li, John C. Grundy, Robert Amor, John G....
This paper presents a dialogue system in the form of an ECA that acts as a sociable and emotionally intelligent companion for the user. The system dialogue is not task-driven but ...
Marc Cavazza, Raul Santos de la Camara, Markku Tur...
Abstract. In a service-oriented world, a long-running business process can be implemented as a set of stateful services that represent the individual but coordinated steps that mak...
Surya Nepal, Alan Fekete, Paul Greenfield, Julian ...
Environmental information systems (EIS) have been in professional use for quite a long time. Applications of this domain often include features of quite common location based servi...
Ari Keronen, Mauri Myllyaho, Pasi Alatalo, Markku ...