Sciweavers

109 search results - page 21 / 22
» From Agents to Organizations: An Organizational View of Mult...
Sort
View
HICSS
1999
IEEE
139views Biometrics» more  HICSS 1999»
13 years 11 months ago
Five Degrees of Separation: A Human Capital Model of Employment-Related Decisionmaking in the Information Technology Workforce
Successful implementation of information technology (IT)-enabled strategy rests on the performance of IT professionals. Consequently, the development and retention of this "I...
Robert A. Josefek Jr., Robert J. Kauffman
AICOM
2002
103views more  AICOM 2002»
13 years 7 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
AAAI
1996
13 years 8 months ago
Navigation for Everyday Life
Past work in navigation has worked toward the goal of producing an accurate map of the environment. While no one can deny the usefulness of such a map, the ideal of producing a co...
Daniel D. Fu, Kristian J. Hammond, Michael J. Swai...
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
USENIX
1994
13 years 8 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze