Abstract. In the core of every information integration and data exchange effort lies the ability to identify whether two pieces of information refer to the same real world entity. ...
We propose an ambient communication system that modulates the reverberance applied to music with a single variable in order to communicate non-musical information to the listener....
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Information Retrieval (IR) systems are built with different goals in mind. Some IR systems target high precision that is to have more relevant documents on the first page of their...