Sciweavers

749 search results - page 29 / 150
» The ethical nature of critical research in information syste...
Sort
View
LREC
2008
110views Education» more  LREC 2008»
13 years 9 months ago
Information Extraction Tools and Methods for Understanding Dialogue in a Companion
This paper discusses how Information Extraction is used to understand and manage Dialogue in the EU-funded Companions project. This will be discussed with respect to the Senior Co...
Roberta Catizone, Alexiei Dingli, Hugo Pinto, Yori...
ISW
2010
Springer
13 years 5 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ECIS
2004
13 years 9 months ago
From intranets to wrestling information infrastructures
This study explores intranets as information infrastructure and this conceptualization is supported by evidence from three interpretive case studies. If an intranet is considered ...
Brian O'Flaherty, Jason Whalley
OZCHI
2005
ACM
14 years 1 months ago
Personalisation in intelligent environments: managing the information flow
This paper describes research into the personalised delivery of information about an intelligent environment. The challenges we need to address are the dual forms of the Invisibili...
Craig Chatfield, David J. Carmichael, René ...
AVI
2008
13 years 10 months ago
Revealing uncertainty for information visualization
Uncertainty in data occurs in domains ranging from natural science to medicine to computer science. By developing ways to include uncertainty in our information visualizations we ...
Meredith M. Skeels, Bongshin Lee, Greg Smith, Geor...