Sciweavers

1140 search results - page 149 / 228
» Active Information Networks and XML
Sort
View
ELPUB
1997
ACM
14 years 2 months ago
The Deconstructed Journal
: The limitations of existing proposed and operational publishing models intended to replace the academic journal are briefly reviewed. Three ‘insights’ are described, the firs...
John W. T. Smith
CAISE
2006
Springer
14 years 2 months ago
On the Notion of Value Object
It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of ...
Hans Weigand, Paul Johannesson, Birger Andersson, ...
SEC
2007
14 years 4 days ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
IJON
2007
87views more  IJON 2007»
13 years 10 months ago
A feature-binding model with localized excitations
We study a model of feature binding in prefrontal cortex which defers specific perceptual information to lower areas and merely maintains the identity of the combination. The mod...
Hecke Schrobsdorff, J. Michael Herrmann, Theo Geis...
JUCS
2011
107views more  JUCS 2011»
13 years 1 months ago
Realising the Potential of Web 2.0 for Collaborative Learning Using Affordances
: With the emergence of the Web 2.0 phenomena, technology-assisted social networking has become the norm. The potential of social software for collaborative learning purposes is cl...
Andreas U. Kuswara, Debbie Richards