With the evolution of the Web evolving towards the Semantic Web, where the information should be presented in a meaningful way for both humans and machines, arises the need for sem...
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
The goal of the work in this paper is towards the incorporation of context in recommender systems in the domain of mobile applications. The approach recommends mobile applications...
1 Reinforcement learning has become a widely used methodology for creating intelligent agents in a wide range of applications. However, its performance deteriorates in tasks with s...
Exploring large virtual environments using a small haptic device with limited-workspace capabilities is a challenging task because the user very quickly reaches the borders of the...