Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
New approaches in the Web environment are underway. These new methodologies try to leverage it from an information medium to a knowledgeable level, from a machine point of view. Th...
Abstract. In order to facilitate the development of agent-based software, several agent programming languages and architectures, have been created. Plans in these architectures are...
Successful knowledge management results in a competitive advantage in today’s information- and knowledge-rich industries. The elaboration and integration of emerging web-based t...
Christian Hirsch, John G. Hosking, John C. Grundy,...
—Collaborative tagging systems with user generated content have become a fundamental element of websites such as Delicious, Flickr or CiteULike. By sharing common knowledge, mass...
Markus Bundschus, Shipeng Yu, Volker Tresp, Achim ...