This paper discusses how Information Extraction is used to understand and manage Dialogue in the EU-funded Companions project. This will be discussed with respect to the Senior Co...
Roberta Catizone, Alexiei Dingli, Hugo Pinto, Yori...
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
This study explores intranets as information infrastructure and this conceptualization is supported by evidence from three interpretive case studies. If an intranet is considered ...
This paper describes research into the personalised delivery of information about an intelligent environment. The challenges we need to address are the dual forms of the Invisibili...
Uncertainty in data occurs in domains ranging from natural science to medicine to computer science. By developing ways to include uncertainty in our information visualizations we ...
Meredith M. Skeels, Bongshin Lee, Greg Smith, Geor...