Sciweavers

1733 search results - page 198 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
AAAI
2006
15 years 3 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
ICSE
2003
IEEE-ACM
16 years 1 months ago
Stemming Architectural Erosion by Coupling Architectural Discovery and Recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Alexander Egyed, Nenad Medvidovic, Paul Grünb...
MM
2009
ACM
178views Multimedia» more  MM 2009»
15 years 8 months ago
Semantic context transfer across heterogeneous sources for domain adaptive video search
Automatic video search based on semantic concept detectors has recently received significant attention. Since the number of available detectors is much smaller than the size of h...
Yu-Gang Jiang, Chong-Wah Ngo, Shih-Fu Chang
HICSS
2003
IEEE
175views Biometrics» more  HICSS 2003»
15 years 7 months ago
Towards a Strategy for Sense-Making of Empirical Knowledge Management Perceptions - The TFL Methodology
There exists a very diverse range of views and perceptions about KM and a need to appreciate these issues and concerns among different communities of knowledge workers. Our resear...
David Yuh Foong Law, Joo Eng Lee-Partridge
IAT
2006
IEEE
15 years 7 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...