Sciweavers

1776 search results - page 45 / 356
» Informational cascades in IT adoption
Sort
View
NIPS
2004
13 years 11 months ago
Contextual Models for Object Detection Using Boosted Random Fields
We seek to both detect and segment objects in images. To exploit both local image data as well as contextual information, we introduce Boosted Random Fields (BRFs), which use boos...
Antonio Torralba, Kevin P. Murphy, William T. Free...
HT
2010
ACM
13 years 12 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
ECIS
2001
13 years 11 months ago
Challenges to Successful ERP Use
Enterprise Resource Planning (ERP) packages have, in the last five years, transformed the way organisations go about the process of providing Information Systems. Instead of craft...
Robert W. Smyth
CSREASAM
2006
13 years 11 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
FOIS
2001
13 years 11 months ago
Ontology: its transformation from philosophy to information systems
- It is no secret that the multidisciplinary sphere of information systems has borrowed the term `ontology' from philosophy, and reinterpreted it to be more suitable for infor...
Gloria L. Zúñiga