Sciweavers

3193 search results - page 539 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
CIKM
2005
Springer
14 years 3 months ago
Word sense disambiguation in queries
This paper presents a new approach to determine the senses of words in queries by using WordNet. In our approach, noun phrases in a query are determined first. For each word in th...
Shuang Liu, Clement T. Yu, Weiyi Meng
EJIS
2007
139views more  EJIS 2007»
13 years 10 months ago
Applying TAM across cultures: the need for caution
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many differ...
Scott McCoy, Dennis F. Galletta, William R. King
CHI
1997
ACM
14 years 2 months ago
A Computer Participant in Musical Improvisation
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
William F. Walker
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 4 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
ISIPTA
2003
IEEE
111views Mathematics» more  ISIPTA 2003»
14 years 3 months ago
The DecideIT Decision Tool
The nature of much information available to decision makers is vague and imprecise, be it information for human managers in organisations or for process agents in a distributed co...
Mats Danielson, Love Ekenberg, Jim Johansson, Aron...