In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicating, collaborating and solving business tasks over email. Many aspects of email have significantly improved over time, but its overall integration with the enterprise environment… (More)
The article provides a brief overview of Social Network Analysis (SNA) and its potential for exploiting the wealth of information buried in the email archives of business and private entities. Within the scope of the COMMIUS 1 project, we built a proof-of-concept prototype in Java, which used the spreading activation algorithm to reconstruct various aspects… (More)
In this paper we provide a brief survey of agent based simulation (ABS) platforms and evaluate two of them --- NetLogo and MASON --- by implementing an exemplary scenario in the context of human behavior modeling. We define twelve evaluation points, which we discuss for both of the evaluated systems. The purpose of our evaluation is to identify the best ABS… (More)
In this paper we describe a lightweight approach for semantic interoperability suitable for small and micro enterprises. The approach is based on reusing the existing enterprise infrastructure – emails and documents – and enables lightweight semantic search and recommendation in order to fulfill interoperability tasks.
The article discusses our email search prototype, which exploits social networks hidden in email archives and the spread of activation algorithm. The prototype offers new way of searching email archives as knowledge repository. The prototype was partially evaluated on the Enron email corpus.
—This article proposes a combination of object-oriented and ontology-based approaches for real-time interworking of human behaviour models in the context of agent-based simulation systems. We present a conceptual design of a semantic intermediation framework, including the split of the responsibilities between the intermediation ontology and software code.… (More)
The article discusses the potential methods and benefits of the analysis of social networks hidden in the enterprise and personal email archives. A proof-of concept prototype was developed. Social network extraction and the spreading activation algorithm are discussed and evaluated.
Fussell-Vesely Importance (FVI) is one of the most commonly used importance measures. It is based on the concept of Minimal Cut Sets (MCSs), and it quantifies the contribution of a system component to system failure. In paper (Kvassay et al. 2015), the algorithm for identification of all system MCSs based on Direct Partial Logic Derivatives (DPLDs) has been… (More)