Sciweavers

327 search results - page 56 / 66
» How to Evaluate Social Intelligence Design
Sort
View
DRM
2006
Springer
14 years 8 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
WWW
2007
ACM
14 years 9 months ago
Promotion of Ontological Comprehension: Exposing Terms and Metadata with Web 2.0
Knowledge artifacts that have been labeled as ontologies have many different qualities and intended outcomes. This is particularly true of bio-ontologies where high demand has led...
Andrew Gibson, Katy Wolstencroft, Robert Stevens
AAAI
1996
13 years 10 months ago
Comet: An Application of Model-Based Reasoning to Accounting Systems
An important problem faced by auditors is gauging how much reliance can be placed on the accounting systems that process millions of transactions to produce the numbers summarized...
Robert Nado, Melanie Chams, Jeff Delisio, Walter H...
ICMI
2003
Springer
164views Biometrics» more  ICMI 2003»
14 years 1 months ago
A visually grounded natural language interface for reference to spatial scenes
Many user interfaces, from graphic design programs to navigation aids in cars, share a virtual space with the user. Such applications are often ideal candidates for speech interfa...
Peter Gorniak, Deb Roy
FLAIRS
2010
13 years 11 months ago
Gamed-Based iSTART Practice: From MiBoard to Self-Explanation Showdown
MiBoard (Multiplayer Interactive Board Game) is an online, turnbased board game that was developed to assess the integration of game characteristics (point rewards, game-like inte...
Justin F. Brunelle