Highlights

Towards an Ontology of Software

Towards an Ontology of Software, Nicola Guarino
For many, software is just code, something intangible best defined in contrast with hardware, but this is not particularly illuminating. (...)


A Research Journey into Enterprise Governance of IT

A Research Journey into Enterprise Governance of I, Wim Van Grembergen
Enterprise governance of IT is a relatively new concept in literature and is gaining more interest in the academic and practitioner’s world. (...)


No Knowledge Without Processes (...) to Find Out What People and Organizations Really Do

No Knowledge Without Processes - Process Mining as, Wil Van Der Aalst
Recently, process mining emerged as a new scientific discipline on the interface between process models and event data. (...)


Semantics of Innovation

Semantics of Innovation, Michele Missikoff
Innovation is today one of the most used terms, when talking about strategies to recover from the current economic downturn. (...)


Big Data Integration - State of the Art & Challenges

Big Data Integration - State of the Art & Challeng, Sonia Bergamaschi
Big data is a popular term for describing the exponential growth, availability and use of information, both structured and unstructured. (...)


Big Data Mining Services and Distributed Knowledge Discovery Applications on Clouds

Big Data Mining Services and Distributed Knowledge, Domenico Talia
Digital data repositories are more and more massive and distributed, therefore we need smart data analysis techniques and scalable architectures (...)


Bridging the Emotional Gap - From Objective Representations to Subjective Interpretations

Bridging the Emotional Gap - From Objective Repres, Marie-Jeanne Lesot
In the framework of affective computing, emotion mining constitutes a classification task that aims at recognising the emotional content of various (...)


A Need-based Assessment for Building a National Cyber Security Workforce

Seymour Goodman - Georgia Institute of Technology
In the United States alone well over a million organizations have become so dependent on cyberspace that their vital interests are now vulnerable to attack, accidents, and design failures that may (...)


Resource-Aware Data Analysis

Katharina Morik -TU Dortmund University
Algorithms are designed in consideration of restricted resources. These have been computing time, memory space, and computing nodes. With big data, large computing centers and cloud computing (...)


First 6789101112131415 Last
ICAART 2020
22-24 February, Valletta
OCT
2019
4
12th Int. Conf. on Agents and Artificial Intelligence
ICORES 2020
22-24 February, Valletta
OCT
2019
4
9th Int. Conf. on Operations Research and Enterprise Systems
SENSORNETS 2020
28-29 February, Valletta
OCT
2019
4
9th Int. Conf. on Sensor Networks
MODELSWARD 2020
25-27 February, Valletta
OCT
2019
4
8th Int. Conf. on Model-Driven Engineering and Software Development
ICISSP 2020
25-27 February, Valletta
OCT
2019
4
6th Int. Conf. on Information Systems Security and Privacy