Sciweavers

1407 search results - page 262 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 2 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner
ISCIS
2004
Springer
14 years 1 months ago
Biological Metaphors for Agent Behavior
A wide variety of practical problems related to the interaction of agents can be examined using biological metaphors. This paper applies the theory of G-networks to agent systems b...
Erol Gelenbe, Varol Kaptan, Yu Wang
IE
2007
13 years 9 months ago
Patterns and computer game design innovation
How can we help people design well-formed and innovative games? The design Patterns of Christopher Alexander is one methodology that has been proposed to assist in the design of w...
Kevin McGee
ISEM
2008
129views more  ISEM 2008»
13 years 8 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
AI
2002
Springer
13 years 7 months ago
Learning Bayesian networks from data: An information-theory based approach
This paper provides algorithms that use an information-theoretic analysis to learn Bayesian network structures from data. Based on our three-phase learning framework, we develop e...
Jie Cheng, Russell Greiner, Jonathan Kelly, David ...