The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In qualitative research, context is essential in order to observe and understand the phenomena of interest in a more holistic way. Emphasizing context in knowledge management (KM) initiatives helps managers choose the most suitable way to implement KM in accordance with their business strategies. This paper integrates the concepts of context, Earl's (2001) seven schools of knowledge management (KM),...
One issue for context-aware applications is to identify without delay situations requiring reactions. The identification of these situations is computed from both dynamic context information and domain specific knowledge. This identification is the output of a process involving context interpretation, aggregation and deduction. In smart environments, these treatments have to be efficient since they...
In this paper, we are interested in content oriented XML information retrieval whose aim is to retrieve not a list of relevant documents, but only fragments of document (XML element) relevant to the user information need. Retrieved XML elements must not only contain relevant information but also be at good level of granularity. The coexistence of content and structural information in XML documents...
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain unintended access or to compromise integrity. Such cases can be difficult to foresee, since typical policy sets consist of thousands of rules. In this paper, we adopt data classification techniques widely used in the machine...
To provide the user with most benefits and personalized services using the available computing resources in ad-hoc networks, context-aware applications need to assimilate both the accessed and derived context information in the network. Derived context is inherently dependent upon sensed data or/and other context information. Context dependency may get introduced in a system due to various reasons,...
Context-aware systems can dynamically adapt to specific dynamic user situations to provide smarter mobile services. In general, context refers to the information that can be used to characterize these situations, and context models are employed to specify contextual information described in context-aware systems. However, even though user context is highly dynamic, existing context models either focus...
The adoption of WSPL as a language for expressing Web service policies has shown its adequacy. The expressivity and simplicity of that language were the key factors behind this success. A desired feature in specifying Web services policies is the introduction of the context concept. In fact, very often Web service designers look for expressing rules that depend on the context in which a Web service...
When supporting ad-hoc collaboration in heterogeneous environments, one has to be able to optimistically cope with failures in order to support reliable cooperation. Composite services technically provide suitable means to implement ad-hoc cooperations. We explore transactional properties of services at runtime to ensure correct execution of workflows by still respecting the autonomy of participants...
Automatic topic detection becomes more important due to the increase of information electronically available and the necessity to process and filter it. In particular, when language is noisy like in weblog postings, it is challenging to determine topics correctly. Nevertheless, it is still unclear, to what extent existing topic detection algorithms are able to deal with this noisy material. In this...
In this paper, a similarity evaluating model based on rough formal concept analysis and information content similarity is proposed which evaluates the similarity degree between the concepts. We use the information content approach to automatically obtain part of similarity scores of two concepts which makes up the normal featural and structural evaluating models. Then through our model, the similarity...
Funded as part of the `Network-Enabled Platforms' program, the Health Services Virtual Organization (HSVO) Project has developed a network-enabled platform (NEP) consisting of a messaging specification, a collection of devices, a bus interface architecture and a middleware hub (SAVOIR) that can support the authoring execution and tracking of multiple independent and integrated simulation activities...
Tens of thousands of universities are today educating students with different methods for a vast variety of majors. This paper aims to introduce Knowledge Tree (KT) as an integrated virtual structure to be used in the educational systems. A collaborative structure is utilized to define a universal curriculum for various university majors worldwide to maximize e-learning capabilities. Then, a collaborative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.