Sciweavers

138 search results - page 4 / 28
» An Information Theory Approach to Identify Sets of Key Playe...
Sort
View
EUROSSC
2009
Springer
13 years 9 months ago
Using Dempster-Shafer Theory of Evidence for Situation Inference
Abstract. In the domain of ubiquitous computing, the ability to identify the occurrence of situations is a core function of being ’contextaware’. Given the uncertain nature of ...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon A. Do...
ECIS
2003
13 years 7 months ago
Positivist single case study research in information systems: a critical analysis
Positivist, single case study is an important research approach within the information systems discipline. This paper provides detailed definitions of key concepts in positivist, ...
Graeme G. Shanks, Anne N. Parr
SASN
2004
ACM
13 years 11 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ECIS
2004
13 years 7 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
CIKM
2010
Springer
13 years 4 months ago
Components for information extraction: ontology-based information extractors and generic platforms
Information Extraction (IE) has existed as a field for several decades and has produced some impressive systems in the recent past. Despite its success, widespread usage and comm...
Daya C. Wimalasuriya, Dejing Dou