Sciweavers

195 search results - page 8 / 39
» Analyzing Online Information Privacy Concerns: An Informatio...
Sort
View
ECIS
2001
13 years 9 months ago
Critical Information Systems Research: A Habermasian Approach
The paper presents a critical inquiry into the relationship between Computer-Mediated Communication (CMC) and progressive rationalisation in modern organisations. By drawing on th...
Dubravka Cecez-Kecmanovic
ALMOB
2007
170views more  ALMOB 2007»
13 years 7 months ago
A spatio-temporal mining approach towards summarizing and analyzing protein folding trajectories
Understanding the protein folding mechanism remains a grand challenge in structural biology. In the past several years, computational theories in molecular dynamics have been empl...
Hui Yang, Srinivasan Parthasarathy, Duygu Ucar
JMLR
2008
159views more  JMLR 2008»
13 years 7 months ago
Near-Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies
When monitoring spatial phenomena, which can often be modeled as Gaussian processes (GPs), choosing sensor locations is a fundamental task. There are several common strategies to ...
Andreas Krause, Ajit Paul Singh, Carlos Guestrin
BPSC
2009
190views Business» more  BPSC 2009»
13 years 8 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 1 months ago
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
Nik R. Hassan, Tom C. Richards, Jack D. Becker