This paper presents a method for mining potential troubles or obstacles related to the use of a given object. Some example instances of this relation are medicine, side effect and...
Stijn De Saeger, Kentaro Torisawa, Jun'ichi Kazama
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Preference elicitation is a serious bottleneck in many decision support applications and agent specification tasks. CP-nets were designed to make the preference elicitation proces...
A complex Enterprise Relationship Planning (ERP) data migration was in trouble: low quality, poor performance, instability, and an overworked team threatened project success. Faci...
In this paper we propose a method to retrieve sketches stored in the form of multiple strokes, by extracting the shape information for each stroke and by considering the spatial r...