Most of the current methodologies for building ontologies rely on specialized knowledge engineers. This is in contrast to real-world settings, where the need for maintenance of do...
Simone Braun, Andreas Schmidt, Andreas Walter, G&a...
A repository of task structures can reveal important latent knowledge about the development of a software system. Although approaches have been proposed to recover artifacts withi...
This paper presents research on the application of the means-end chain (MEC) framework for investigating customers cognitive structure regarding community applications. It is argu...
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...