Sciweavers

749 search results - page 74 / 150
» The ethical nature of critical research in information syste...
Sort
View
IJCAI
1993
13 years 9 months ago
A Model-Theoretic Approach to the Verification of Situated Reasoning Systems
agent-oriented system. We show the complexity to be linear time for one of these logics and polynomial time for another, thus providing encouraging results with respect to the prac...
Anand S. Rao, Michael P. Georgeff
CANDC
2009
ACM
14 years 2 months ago
Local issues, local uses: tools for robotics and sensing in community contexts
This paper describes six creativity support tools we developed to foster community engagement and expression with robotics and sensing, assessing the benefits and shortcomings of ...
Carl F. DiSalvo, Marti Louw, Julina Coupland, Mary...
COORDINATION
2004
Springer
14 years 1 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 1 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
NLDB
2007
Springer
14 years 1 months ago
DLSITE-1: Lexical Analysis for Solving Textual Entailment Recognition
This paper discusses the recognition of textual entailment in a text-hypothesis pair by applying a wide variety of lexical measures. We consider that the entailment phenomenon can ...
Óscar Ferrández, Daniel Micol, Rafae...