Sciweavers

3193 search results - page 559 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
CIMCA
2005
IEEE
13 years 11 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
HF
2002
95views more  HF 2002»
13 years 8 months ago
Formal Verification of Human-Automation Interaction
This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machi...
Asaf Degani, Michael Heymann
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 7 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
VIS
2009
IEEE
215views Visualization» more  VIS 2009»
14 years 10 months ago
BrainGazer - Visual Queries for Neurobiology Research
Abstract-- Neurobiology investigates how anatomical and physiological relationships in the nervous system mediate behavior. Molecular genetic techniques, applied to species such as...
Stefan Bruckner, Veronika Šoltészová, M. Edua...
IFIP12
2009
13 years 6 months ago
User Recommendations based on Tensor Dimensionality Reduction
Social Tagging is the process by which many users add metadata in the form of keywords, to annotate and categorize items (songs, pictures, web links, products etc.). Social tagging...
Panagiotis Symeonidis