Business Intelligence (BI) capitalized on datamining and analytics techniques for discovering trends and reacting to events with quick decisions. We argued that a new breed of dat...
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
One issue for context-aware applications is to identify without delay situations requiring reactions. The identification of these situations is computed from both dynamic context ...
Funded as part of the `Network Enabled Platforms' program the Health Services Virtual Organization (HSVO) Project has developed a network-enabled platform (NEP) consisting of...
Rachel H. Ellaway, Jeremy R. Cooperstock, Bruce Sp...
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...