Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
: Successfully incorporating utility engineering functions into business decisions requires integrating the numeric-intensive world of the engineer with business systems that are d...
Attending a complex scheduled social event, such as a multi-day music festival, requires a significant amount of planning before and during its progression. Advancements in mobile...
Jeff Crow, Eryn Whitworth, Ame Wongsa, Luis Franci...
We propose an intelligent document title classification agent based on a theory of information inference. The information is represented as vectorial spaces computed by a cognitive...
Dawei Song, Peter Bruza, Zi Huang, Raymond Y. K. L...
Image mining systems that can automatically extract semantically meaningful information (knowledge) from image data are increasingly in demand. The fundamental challenge in image m...