By its very nature, software development consists of many knowledge-intensive processes. One of the most difficult to model, however, is requirements elicitation. This paper prese...
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
In this paper, we aim to identify what kinds of knowledge management (KM) challenges are typical in the renewal of software development processes, and to propose solutions to the ...
P2P techniques for semantic coordination based on semantic communities are recently emerging to enforce effective collaboration platforms. In this paper, we focus on semantic coo...
An overwhelming number of legal documents is available in digital form. However, most of the texts are usually only provided in a semi-structured form, i.e. the documents are stru...