Smart homes have a user centered design that makes human activity as the most important type of context to adapt the environment according to people's needs. Sensor systems th...
Atif Manzoor, Claudia Villalonga, Alberto Calatron...
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
This paper presents CBRetaliate, an agent that combines Case-Based Reasoning (CBR) and Reinforcement Learning (RL) algorithms. Unlike most previous work where RL is used to improve...
Bryan Auslander, Stephen Lee-Urban, Chad Hogg, H&e...
A recommender system suggests items to a user for a given query by personalizing the recommendations based on the user interests. User personalization is usually done by asking us...
Deepak Khemani, Mohamed A. K. Sadiq, Rakesh Bangan...
We studied 52 field examples interaction breakdown in information technology project virtual teams and actions leaders took to fix it using information and communication technolog...