Sciweavers

1407 search results - page 251 / 282
» Systems Theory Model for Information Security
Sort
View
ECAI
2004
Springer
14 years 2 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...
WWW
2006
ACM
14 years 9 months ago
Reappraising cognitive styles in adaptive web applications
The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contempor...
Adam Moore, Elizabeth J. Brown, Helen Ashman, Tim ...
JAMIA
2010
115views more  JAMIA 2010»
13 years 4 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
14 years 9 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
CEC
2011
IEEE
12 years 9 months ago
Towards human-like social multi-agents with memetic automaton
Abstract—Memetics is a new science that has attracted increasing attentions in the recent decades. Beyond the formalism of simple hybrids, adaptive hybrids and memetic algorithms...
Liang Feng, Yew-Soon Ong, Ah-Hwee Tan, Xianshun Ch...