Sciweavers

2699 search results - page 539 / 540
» Planning to Gather Information
Sort
View
RE
2010
Springer
13 years 8 days ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
SOICT
2010
13 years 7 days ago
Constraint-based local search for solving non-simple paths problems on graphs: application to the routing for network covering p
Routing problems have been considered as central problems in the fields of transportation, distribution and logistics. LS(Graph) is a generic framework allowing to model and solve...
Pham Quang Dung, Phan-Thuan Do, Yves Deville, Tuon...
CHI
2011
ACM
12 years 9 months ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
CHI
2011
ACM
12 years 9 months ago
Modeling users of intelligent systems
While many devices today increasingly have the ability to predict human activities, it is still difficult to build accurate personalized machine learning models. As users today wi...
Stephanie Rosenthal
ATAL
2011
Springer
12 years 5 months ago
ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison
In creating an evacuation simulation for training and planning, realistic agents that reproduce known phenomenon are required. Evacuation simulation in the airport domain requires...
Jason Tsai, Natalie Fridman, Emma Bowring, Matthew...