|
|
|
Andrei Brazhuk
Pág. 38 - 41
This paper discusses the problem of extracting and using knowledge of public directories of software attacks and vulnerabilities to build semantic threat models. The possible purpose of such models is using as a core of a knowledge managem...
ver más
|
|
|
|
|
|
Matthew Warren,Oliver Burmeister
This is the second special section on applied ethics for AJIS. As was the case for the first special section on ethics, of the various submissions, only three have been accepted for publication. This is not an indication that little work is being done in...
ver más
|
|
|
|
|
|
Jennifer Vardaro, Moritz Schaeffer and Silvia Hansen-Schirra
This study aims to analyse how translation experts from the German department of the European Commission?s Directorate-General for Translation (DGT) identify and correct different error categories in neural machine translated texts (NMT) and their post-e...
ver más
|
|
|
|
|
|
Nur Fatin Syazwani Johar
Pág. 35
Distillation is a widely-used method by industry for separating mixtures of liquids. Distillation is responsible for a significant amount of energy consumption of the world?s process industry. Concerns over recent high energy consumption and economic pre...
ver más
|
|
|
|
|
|
Klaus Solberg Söilen
IT have indeed merged: new empirical data?, Vol 7, No 1 (2017) ?Business intelligence, big data andtheory? and Vol 6, No 3 (2016) ?What role does technology play for intelligence studies at the start of the21st century??. Special issues have looked at th...
ver más
|
|
|