Sciweavers

1393 search results - page 81 / 279
» Home, work, (play)
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 1 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
ECIS
2004
15 years 1 months ago
Reflections on technology acceptance in higher education
The use of new information technology impacts individual work as well as the whole organization. This paper illuminates some preliminary findings from an ongoing study about impac...
Jyri Naarmala
ISI
2006
Springer
14 years 12 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
CSL
1998
Springer
14 years 11 months ago
Evaluation in the context of natural language generation
What role should evaluation play in the development of natural language generation () techniques and systems? In this paper we describe what is involved in natural langua...
Chris Mellish, R. Dale
ECSCW
2011
13 years 11 months ago
The Hugging Team: The Role of Technology in Business Networking Practices
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Anne Thorsø Sørensen, Irina Shklovsk...