Sciweavers

25538 search results - page 40 / 5108
» Explanation in Information Systems
Sort
View
SIGSOFT
2008
ACM
14 years 10 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
MEDINFO
2007
137views Healthcare» more  MEDINFO 2007»
13 years 11 months ago
How do Clinicians Search For and Access Biomedical Literature to Answer Clinical Questions?
This paper presents a retrospective data analysis on how 75 clinicians searched for and accessed biomedical literature from an online information retrieval system to answer six cl...
Annie Y. S. Lau, Enrico W. Coiera
SIGIR
2002
ACM
13 years 9 months ago
Comparing cross-language query expansion techniques by degrading translation resources
The quality of translation resources is arguably the most important factor affecting the performance of a cross-language information retrieval system. While many investigations ha...
Paul McNamee, James Mayfield
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 3 months ago
Does the Extended Technology Acceptance Model Apply to Physicians
In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
William G. Chismar, Sonja Wiley-Patton
AAAI
1990
13 years 11 months ago
Probabilistic Semantics for Cost Based Abduction
Cost-based abduction attempts to find the best explanation for a set of facts by finding a minimal cost proof for the facts. The costs are computed by summing the costs of the ass...
Eugene Charniak, Solomon Eyal Shimony