Sciweavers

16921 search results - page 3365 / 3385
» Information Technology
Sort
View
ISI
2006
Springer
14 years 9 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
JBI
2006
140views Bioinformatics» more  JBI 2006»
14 years 9 months ago
Chester: Towards a personal medication advisor
Dialogue systems for health communication hold out the promise of providing intelligent assistance to patients through natural interfaces that require no training to use. But in o...
James F. Allen, George Ferguson, Nate Blaylock, Do...
JTAER
2008
175views more  JTAER 2008»
14 years 9 months ago
A Core Component-based Modelling Approach for Achieving e-Business Semantics Interoperability
The adoption of advanced integration technologies that enable private and public organizations to seamlessly execute their business transactions electronically is still relatively...
Till Janner, Fenareti Lampathaki, Volker Hoyer, Sp...
SIGCSE
2008
ACM
171views Education» more  SIGCSE 2008»
14 years 9 months ago
Contributing student pedagogy
A Contributing Student Pedagogy (CSP) is a pedagogy that encourages students to contribute to the learning of others and to value the contributions of others. CSP in formal educat...
John Hamer, Quintin I. Cutts, Jana Jacková,...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
« Prev « First page 3365 / 3385 Last » Next »