There is an extensive literature on data mining techniques, including several applications of these techniques in the e-commerce setting. However, all previous approaches require t...
Microshrinkages are known as probably the most difficult defects to avoid in high-precission foundry. Depending on the magnitude of this defect, the piece in which it appears must...
Yoseba K. Penya, Pablo Garcia Bringas, Argoitz Zab...
MIPv6 is the IPv6 based mobility management protocol and it is expected to become the mobility management protocol of choice for the Next Generation Wireless Access Networks. In o...
Faqir Zarrar Yousaf, Christian Bauer, Christian Wi...
In this paper, we describe an approach to modelling contextaware systems starting on the knowledge level. We make use of ideas from Activity Theory to structure the general contex...
The contribution of intelligent agents for the human team performance is a challenging problem. This paper introduces a study to help clarifying this issue, starting with the moti...