Sciweavers

771 search results - page 51 / 155
» What is situated evolution
Sort
View
RE
2002
Springer
13 years 9 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
CHI
2005
ACM
14 years 10 months ago
Context-aware collaborative filtering system: predicting the user's preferences in ubiquitous computing
In this paper I propose a context-aware collaborative filtering system that can predict a user's preference in different context situations based on past user-experiences. Th...
Annie Chen
CONTEXT
2007
Springer
14 years 4 months ago
Context and Design Agents
Informal notions of context often imply much more than that captured in many computational formalisms of it. The view presented in this paper, built on our understanding of designi...
John S. Gero, Gregory J. Smith
CAISE
2004
Springer
14 years 3 months ago
Business Process Modeling Tools for Modeling of Organizational Structure
We can use Business Process Modeling (BPM) tools for modeling the organizational structure, however, there are many imperfections in the existing BPM tools that hinder the process ...
Renate Sprice, Uldis Eihenbergs
HICSS
2003
IEEE
95views Biometrics» more  HICSS 2003»
14 years 3 months ago
Knowledge Negotiation in Asynchronous Learning Networks
The negotiation of what is to count as mutually acceptable collaborative knowledge is difficult to conduct when participants cannot interact face-to-face. We review certain relate...
Gerry Stahl