Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Position: GDPR Compliance by Construction

    New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...

    Malte Schwarzkopf, Eddie Kohler in Heterogeneous Data Management, Polystores,… (2019)

  2. No Access

    Chapter and Conference Paper

    Opponent Modeling for Virtual Human Negotiators

    Negotiation is a challenging domain for virtual human research. One aspect of this problem, known as opponent modeling, is discovering what the other party wants from the negotiation. Research in automated negoti...

    Zahra Nazari, Gale M. Lucas, Jonathan Gratch in Intelligent Virtual Agents (2015)

  3. No Access

    Chapter and Conference Paper

    HySoN: A Distributed Agent-Based Protocol for Group Formation in Online Social Networks

    On-line social networks allow people to easily interact with each other by means of social computer services. This scenario makes possible to search in a social network for affinities or new opportunities that...

    Fabrizio Messina, Giuseppe Pappalardo, Domenico Rosaci in Multiagent System Technologies (2013)

  4. No Access

    Chapter and Conference Paper

    Using Properties to Compare Both Words and Clauses

    There are many applications that use the semantic similarity of words to compare input to stored data, such as conversational agents. When a human thinks of a word they consider a meaning which has associated ...

    David M. Pearce, Zuhair Bandar, David Mclean in Agent and Multi-Agent Systems: Technologie… (2011)

  5. No Access

    Chapter and Conference Paper

    Evaluating Interaction of MAS Providing Context-Aware Services

    Much effort has been spent on suggesting and implementing new architectures of MAS to specific domains. Often each new architecture is not even compared to any existing architectures in order to evaluate their...

    Nayat Sanchez-Pi, David Griol, Javier Carbo in Agent and Multi-Agent Systems: Technologie… (2011)

  6. No Access

    Chapter and Conference Paper

    VigilAgent for the Development of Agent-Based Multi-robot Surveillance Systems

    Usually, surveillance applications are developed following an ad-hoc approach instead of using a methodology to guide stakeholders in achieving quality standards expected from commercial software. To solve thi...

    José M. Gascueña, Elena Navarro in Agent and Multi-Agent Systems: Technologie… (2011)

  7. No Access

    Chapter and Conference Paper

    Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System

    We propose OntoGain, a system for unsupervised ontology acquisition from unstructured text which relies on multi-word term extraction. For the acquisition of taxonomic relations, we exploit inherent multi-word te...

    Euthymios Drymonas, Kalliopi Zervanou in Natural Language Processing and Informatio… (2010)

  8. No Access

    Chapter and Conference Paper

    University and Primary Schools Cooperation for Small Robots Programming

    In July 2007, in the Italian northwest region named Piedmont, a number of teachers and school headmasters created a School-Net for k-12 "Educational use of robotics". The School-Net aims at promoting Papert’s ...

    G. Barbara Demo, Simonetta Siega in Visioning and Engineering the Knowledge So… (2009)

  9. No Access

    Chapter and Conference Paper

    The Impact of Positive Electronic Word-of-Mouth on Consumer Online Purchasing Decision

    Despite the extensive use of online reputational mechanism such as products reviews forum to promote trust and purchase decisions, there has been little empirical evidence to support the notion that positive w...

    Christy M. K. Cheung, Matthew K. O. Lee in Visioning and Engineering the Knowledge So… (2009)

  10. No Access

    Chapter and Conference Paper

    A Filtering and Recommender System Prototype for Scholarly Users of Digital Libraries

    The research and scholarly community of users in a digital library presents several characteristics that make necessary the development of new services capable of satisfying their specific information needs. I...

    José M. Morales-del-Castillo, Eduardo Peis in Visioning and Engineering the Knowledge So… (2009)

  11. No Access

    Chapter and Conference Paper

    Semantic-Based Tool to Support Assessment and Planning in Early Care Settings

    In recent years, governments and educational institutions have increased their interest in enhancing and expanding pre-school programs and services. In order to achieve a high-quality education, governments ha...

    Ruben Miguez, Juan M. Santos, Luis Anido in Visioning and Engineering the Knowledge So… (2009)

  12. No Access

    Chapter and Conference Paper

    Enterprise Resource Planning: An Applications’ Training Aid Based on Semantic Web Principles

    An integrated ERP system is an asset for any organization using it, but since its full deployment requires increased cooperation between business units, there is a need to provide the users involved with appro...

    Aristomenis M. Macris in Visioning and Engineering the Knowledge So… (2009)

  13. No Access

    Chapter and Conference Paper

    An Eclipse GMF Tool for Modelling User Interaction

    Model-Driven Development (MDD) has encouraged the use of automated software tools that facilitate the development process from modelling to coding. User Interfaces (UI), as a significant part of most applicati...

    Jesús M. Almendros-Jiménez, Luis Iribarne in Visioning and Engineering the Knowledge So… (2009)

  14. No Access

    Chapter and Conference Paper

    Design for All in the Ambient Intelligence Environment

    An Information Society described by the Ambient Intelligence (AmI) paradigm is emerging, due to the ongoing technological developments. The paper aims to show that a designed for all AmI environment can have a...

    P. L. Emiliani, M. Billi, L. Burzagli in Computers Hel** People with Special Needs (2008)

  15. No Access

    Chapter and Conference Paper

    Noise Detection in Agent Reputation Models Using IMM Filtering

    Inferring Trust in dynamic and subjective environments is a key interesting issue in the way to obtain a complete delegation of human-like decisions in autonomous agents. With this final intention several trus...

    Javier Carbo, Jesus Garcia, Jose M. Molina in Trust in Agent Societies (2008)

  16. No Access

    Chapter and Conference Paper

    Short Linkable Ring Signatures Revisited

    Ring signature is a group-oriented signature in which the signer can spontaneously form a group and generate a signature such that the verifier is convinced the signature was generated by one member of the gro...

    Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang in Public Key Infrastructure (2006)

  17. No Access

    Chapter and Conference Paper

    A Classification, Based on ICF, for Modelling Human Computer Interaction

    The present paper describes a study on the use of the International Classification of Functioning Disability and Health (ICF) of the World Health Organization (WHO) for modelling the interaction between humans...

    M. Billi, L. Burzagli, P. L. Emiliani in Computers Hel** People with Special Needs (2006)

  18. No Access

    Chapter and Conference Paper

    Identity-Based Strong Multi-Designated Verifiers Signatures

    Designated verifier signatures are privacy-oriented signatures that provide message authenticity only to a specified verifier but nobody else. We consider strong multi-designated verifiers such that knowledge ...

    Sherman S. M. Chow in Public Key Infrastructure (2006)

  19. No Access

    Chapter and Conference Paper

    A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases

    In the presence of dirty data, a search for specific information by a standard query (e.g., search for a name that is misspelled or mistyped) does not return all needed information. This is an issue of grave i...

    Olcay Kursun, Anna Koufakou, Bing Chen in Intelligence and Security Informatics (2006)

  20. No Access

    Chapter and Conference Paper

    An Agent-Based Compositional Framework

    Web services requirements for means of automating the coordination of distributed heterogeneous applications have been addressed by a two-pronged initiative. One has been driven by process management technolog...

    R. Anane, Y. Li, C -F Tsai, K -M Chao in Web Technologies Research and Development … (2005)

previous disabled Page of 2