Sciweavers

1407 search results - page 225 / 282
» Systems Theory Model for Information Security
Sort
View
CHI
2006
ACM
14 years 9 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas
MOBIHOC
2001
ACM
14 years 8 months ago
Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices
This paper presents 7DS, a novel peer-to-peer data sharing system. 7DS is an architecture, a set of protocols and an implementation enabling the exchange of data among peers that ...
Maria Papadopouli, Henning Schulzrinne
HICSS
2006
IEEE
73views Biometrics» more  HICSS 2006»
14 years 3 months ago
Determining Success for Different Website Goals
In building a successful website it is imperative that the design matches the organization’s objectives, which should be well defined. Clearly, different types of websites will ...
L. Christian Schaupp, Weiguo Fan, France Belanger
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
14 years 3 months ago
Action-selection and crossover strategies for self-modeling machines
In previous work [7] a computational framework was demonstrated that employs evolutionary algorithms to automatically model a given system. This is accomplished by alternating the...
Josh C. Bongard