Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
Modeling requires considerable knowledge of the various stages of the simulation process. The modeler needs to know a great deal of the system to be modeled (domain specific knowl...
In this paper, we present the H-Change methodology we have specifically conceived for evolving independent ontologies in open networked systems. Furthermore, we describe the change...
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Web personalization is the process of customizing a web site to the needs of each specific user or set of users, taking advantage of the knowledge acquired through the analysis of ...