Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
— This paper presents the prototype of an expert peering system for information exchange in the knowledge society. Our system realizes an intelligent, real-time search engine for...
Christian Bauckhage, Tansu Alpcan, Sachin Agarwal,...
In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context....
In todays increasingly dynamic and competitive business environment, organizations strive to leverage their information resources to gain and sustain competitive advantage. Deci...