Sciweavers

1407 search results - page 240 / 282
» Systems Theory Model for Information Security
Sort
View
DCOSS
2006
Springer
14 years 26 days ago
Evaluating Local Contributions to Global Performance in Wireless Sensor and Actuator Networks
Wireless sensor networks are often studied with the goal of removing information from the network as efficiently as possible. However, when the application also includes an actuato...
Christopher J. Rozell, Don H. Johnson
ATAL
2008
Springer
13 years 11 months ago
Belief operations for motivated BDI agents
The beliefs of an agent reflecting her subjective view of the world constitute one of the main components of a BDI agent. In order to incorporate new information coming from other...
Patrick Krümpelmann, Matthias Thimm, Manuela ...
IE
2007
13 years 10 months ago
Dramatic flow in interactive 3D narrative
The concept of dramatic level is crucial for a model of dramatic flow. We present a framework to maintain optimal dramatic flow in an interactive 3D environment where both linea...
Alyx Macfadyen, Andrew Stranieri, John Yearwood
SIGIR
2012
ACM
11 years 11 months ago
Top-k learning to rank: labeling, ranking and evaluation
In this paper, we propose a novel top-k learning to rank framework, which involves labeling strategy, ranking model and evaluation measure. The motivation comes from the difficul...
Shuzi Niu, Jiafeng Guo, Yanyan Lan, Xueqi Cheng
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox