Related Work -- Data Analysis and Domain Model Construction -- Incorporating Additional Knowledge -- A Dialogue System for Partially Structured Data -- UKSearch - Intelligent Web Search -- UKSearch - Evaluation and Discussion -- YPA - Searching Classified Directories -- Future Directions and Conclusions.Collections of digital documents can nowadays be found everywhere in institutions, universit…
Implementation of Functional Languages -- Lazy Assertions -- Interfacing Haskell with Object-Oriented Languages -- A Functional Shell That Dynamically Combines Compiled Code -- Polymorphic Type Reconstruction Using Type Equations -- Correctness of Non-determinism Analyses in a Parallel-Functional Language -- Inferring Cost Equations for Recursive, Polymorphic and Higher-Order Functional Program…
Security Standards -- Information Security Standards: Adoption Drivers (Invited Paper) -- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper) -- From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) -- Security Culture -- How Much Should We Pay for Security? (Invited Paper) -- Do Not Ship, or Receive, Trojan Horses -- Employee…
Text versus Talk -- Changing Cultures of Written Communication: Letter — E-mail — SMS -- Language in SMS — a socio-linguistic view -- Please reply! The replying norm in adolescent SMS communication -- Nascent Communication Genres within SMS and MMS -- Inside Text: an introduction -- Texting and the Moral Order of Place -- From Voice to Text: continuity and change in the use of mobile phon…
The large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The more information is available, the harder it is to locate any particular piece of it. And even when it has been successfully found, it is even harder still to usefully combine it with other information we may already possess. It is commonly understood that this problem of inf…
Single Stream Networks -- Background -- The Negative Feedback Network -- Peer-Inhibitory Neurons -- Multiple Cause Data -- Exploratory Data Analysis -- Topology Preserving Maps -- Maximum Likelihood Hebbian Learning -- Dual Stream Networks -- Two Neural Networks for Canonical Correlation Analysis -- Alternative Derivations of CCA Networks -- Kernel and Nonlinear Correlations -- Exploratory Corr…
Introductory Chapter -- An Introduction to Human-Centered Software Engineering -- Principles, Myths and Challenges -- Key Principles for User-Centred Systems Design -- HCI, Usability and Software Engineering Integration: Present and Future -- Surveying the Solitudes: An Investigation into the Relationships between Human Computer Interaction and Software Engineering in Practice -- Convergence or…
SDL and eODL -- Deployment and Configuration of Distributed Systems -- eODL and SDL in Combination for Components -- Applying eODL and SDL-Patterns for Developing TMN Managed Systems -- SPT – The SDL Pattern Tool -- Evolution of Languages -- Comparing UML 2.0 Interactions and MSC-2000 -- Data Encoding for SDL in ITU-T Rec. Z.104 -- SDL in a Changing World -- Requirements and MSC -- Early Val…
The Cognitive Framework for Information -- The Development of Information Seeking Research -- System-Oriented Information Retrieval -- Cognitive and User-Oriented Information Retrieval -- The Integrated IS&R Research Framework -- Implications of the Cognitive Framework for IS&R -- Towards a Research Program -- Conclusion.T The Turn analyzes the research of information seeking and retrieval (IS&…
Keynotes -- Modeling and Simulation Methodology – I -- Manufacturing -- Aerospace – I -- Military Simulation -- Medical Simulation – I -- General Applications – I -- Network – I -- e-Business -- Numerical Simulation -- Modeling and Simulation Methodology – II -- Traffic Simulation -- Network – II -- Aerospace – II -- Network – III -- General Applications – II -- Transportati…