The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Governments and other groups interested in the views of citizens require the means to present justifications of proposed actions, and the means to solicit public opinion concerning...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...
Abstract. One of the problem in business process reengineering is the identification and implementation of new workflow procedures for specific business processes, if they are not ...
This paper presents an approach for reconstructing a realistic 3D model of a building from its uncalibrated video sequences taken by a hand-held camera. The novelty of this approa...
The Connectionist Inductive Learning and Logic Programming System, C-IL 2 P, integrates the symbolic and connectionist paradigms of Artificial Intelligence through neural networks...