Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
In this paper I propose a context-aware collaborative filtering system that can predict a user's preference in different context situations based on past user-experiences. Th...
Informal notions of context often imply much more than that captured in many computational formalisms of it. The view presented in this paper, built on our understanding of designi...
We can use Business Process Modeling (BPM) tools for modeling the organizational structure, however, there are many imperfections in the existing BPM tools that hinder the process ...
The negotiation of what is to count as mutually acceptable collaborative knowledge is difficult to conduct when participants cannot interact face-to-face. We review certain relate...