Sciweavers

1407 search results - page 246 / 282
» Systems Theory Model for Information Security
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Bootstrapping trust evaluations through stereotypes
In open, dynamic multi-agent systems, agents may form short-term ad-hoc groups, such as coalitions, in order to meet their goals. Trust and reputation are crucial concepts in thes...
Chris Burnett, Timothy J. Norman, Katia P. Sycara
CHI
2011
ACM
13 years 23 days ago
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
WWW
2004
ACM
14 years 9 months ago
Continuous web: a new image-based hypermedia and scape-oriented browsing
Conventionally, Web pages have been recognized as documents described by HTML. Image data, such as photographs, logos, maps, illustrations, and decorated text, have been treated a...
Hiroya Tanaka, Katsumi Tanaka
ICDCS
2002
IEEE
14 years 2 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
LCTRTS
2010
Springer
14 years 4 months ago
Sampling-based program execution monitoring
For its high overall cost during product development, program debugging is an important aspect of system development. Debugging is a hard and complex activity, especially in time-...
Sebastian Fischmeister, Yanmeng Ba