—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
Many software applications consist of a number of interdependent steps and are executed under the supervision of a human administrator or operator. The administrator responds to e...
This paper describes a method and system for integrating machine learning with planning and data visualization for the management of mobile sensors for Earth science investigation...
Robert A. Morris, Nikunj C. Oza, Leslie Keely, Eli...
The overall purpose of this paper is to demonstrate the relevance of semiotics concepts to the analysis of intelligent control systems. Semiotics has only a minor impact on resear...