Sciweavers

1924 search results - page 39 / 385
» Where is the knowledge we have lost in managers
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JUCS
2007
121views more  JUCS 2007»
13 years 7 months ago
Semantic-based Skill Management for Automated Task Assignment and Courseware Composition
Abstract: Knowledge management is characterized by many different activities ranging from the elicitation of knowledge to its storing, sharing, maintenance, usage and creation. Sk...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
FLAIRS
2004
13 years 9 months ago
An Active Architecture for Managing Events in Pervasive Computing Environments
Many dramatizations have depicted a fully automated home living environment, where actions and events are understood or even anticipated. While the realization of such environment...
Edwin Wong, Lisa J. Burnell, Charles Hannon
CSIE
2009
IEEE
14 years 2 months ago
Integration of a Concept Map Generator and a Knowledge-Portal-Based E-learning System
Knowledge management (KM) is the research field aimed to create, organize, and store explicit knowledge for easy access and manipulation, whereas e-learning is concerned with del...
Jyh-Da Wei, Tai-Yu Chen, Tsai-Yeh Tung, D. T. Lee
ICCBR
1995
Springer
13 years 11 months ago
On the use of CBR in optimisation problems such as the TSP
The particular strength of CBR is normally considered to be its use in weak theory domains where solution quality is compiled into cases and is reusable. In this paper we explore a...
Padraig Cunningham, Barry Smyth, Neil J. Hurley