Sciweavers

338 search results - page 27 / 68
» Fit and social construction in knowledge management systems
Sort
View
CHIMIT
2007
ACM
14 years 13 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ATAL
2003
Springer
14 years 1 months ago
Searching social networks
A referral system is a multiagent system whose member agents are capable of giving and following referrals. The specific cases of interest arise where each agent has a user. The ...
Bin Yu, Munindar P. Singh
TR
2010
204views Hardware» more  TR 2010»
13 years 3 months ago
Anomaly Detection Through a Bayesian Support Vector Machine
This paper investigates the use of a one-class support vector machine algorithm to detect the onset of system anomalies, and trend output classification probabilities, as a way to ...
Vasilis A. Sotiris, Peter W. Tse, Michael Pecht
JSS
2006
118views more  JSS 2006»
13 years 8 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun
OOIS
1994
Springer
14 years 16 days ago
Problems, Descriptions and Objects
The business of software development is solving problems. Following Polya, we can increase our ability to solve problems by focusing directly on problems themselves, on their part...
Michael Jackson