Sciweavers

1995 search results - page 38 / 399
» A model for information technologies that can be creative
Sort
View
WWW
2008
ACM
14 years 9 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CHI
2008
ACM
14 years 9 months ago
Usability evaluation considered harmful (some of the time)
Current practice in Human Computer Interaction as encouraged by educational institutes, academic review processes, and institutions with usability groups advocate usability evalua...
Saul Greenberg, William Buxton
WWW
2009
ACM
14 years 9 months ago
SOFIE: a self-organizing framework for information extraction
This paper presents SOFIE, a system for automated ontology extension. SOFIE can parse natural language documents, extract ontological facts from them and link the facts into an on...
Fabian M. Suchanek, Mauro Sozio, Gerhard Weikum
SIGIR
2006
ACM
14 years 2 months ago
Personalized recommendation driven by information flow
We propose that the information access behavior of a group of people can be modeled as an information flow issue, in which people intentionally or unintentionally influence and in...
Xiaodan Song, Belle L. Tseng, Ching-Yung Lin, Ming...
CAISE
2007
Springer
14 years 2 months ago
Negotiating Models
We investigate the process of collaborative modeling by analyzing conversations and loud thinking during modeling sessions and the resulting models themselves. We discovered the ba...
Peter Rittgen