Sciweavers

2767 search results - page 200 / 554
» Knowledge Relativity
Sort
View
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 3 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
SPLC
2004
13 years 10 months ago
Observations from the Recovery of a Software Product Family
The problem of managing the evolution of complex and large software systems is well known. Evolution implies reuse and modification of existing software artifacts, and this means t...
Patricia Lago, Hans van Vliet
CHI
1999
ACM
14 years 1 months ago
The Elements of Computer Credibility
Given the importance of credibility in computing products, the research on computer credibility is relatively small. To enhance knowledge about computers and credibility, we defin...
B. J. Fogg, Hsiang Tseng
JUCS
2008
100views more  JUCS 2008»
13 years 9 months ago
Stacked Dependency Networks for Layout Document Structuring
: We address the problems of structuring and annotation of layout-oriented documents. We model the annotation problems as the collective classification on graph-like structures wit...
Boris Chidlovskii, Loïc Lecerf
ICCBR
2007
Springer
14 years 1 months ago
Application of the Revision Theory to Adaptation in Case-Based Reasoning: The Conservative Adaptation
Case-based reasoning aims at solving a problem by the adaptation of the solution of an already solved problem that has been retrieved in a case base. This paper defines an approach...
Jean Lieber