Sciweavers

385 search results - page 69 / 77
» Perturbation Analysis with Qualitative Models
Sort
View
SBIA
2000
Springer
13 years 11 months ago
User profiling with Case-Based Reasoning and Bayesian Networks
Agent technology provides many services to users. The tasks in which agents are involved include information filtering, information retrieval, user's tasks automation, browsin...
Silvia N. Schiaffino, Analía Amandi
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
VIP
2000
13 years 9 months ago
Graphically Defining Articulable Tacit Knowledge
Although codified knowledge and its capture is commonplace, tacit knowledge has up until recent years proved elusive in its inclusion within the organisation's knowledge base...
Peter Busch, Debbie Richards
CG
2008
Springer
13 years 8 months ago
Practical global illumination for interactive particle visualization
Particle-based simulation methods are used to model a wide range of complex phenomena and to solve time-dependent problems of various scales. Effective visualizations of the resul...
Christiaan P. Gribble, Carson Brownlee, Steven G. ...
EOR
2006
104views more  EOR 2006»
13 years 7 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke