Sciweavers

109 search results - page 7 / 22
» Non-Deterministic Social Laws
Sort
View
ISI
2008
Springer
14 years 9 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
DALT
2006
Springer
15 years 1 months ago
Agreeing on Defeasible Commitments
Social commitments are developed for multi-agent systems according to the current practice in law regarding contract formation and breach. Deafeasible commitments are used to provi...
Ioan Alfred Letia, Adrian Groza
ACSAC
2010
IEEE
14 years 7 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
BPM
2007
Springer
144views Business» more  BPM 2007»
15 years 3 months ago
Managing Socio-technical Interactions in Healthcare Systems
Abstract. We put forward an architectural framework that promotes the externalisation of the social dimension that arises in software-intensive systems which, like in healthcare, e...
Osama El-Hassan, José Luiz Fiadeiro, Reiko ...
ICDE
2008
IEEE
162views Database» more  ICDE 2008»
15 years 11 months ago
Adaptive Approximate Similarity Searching through Metric Social Networks
Exploiting the concepts of social networking represents a novel approach to the approximate similarity query processing. We present a metric social network where relations between...
Jan Sedmidubský, Pavel Zezula, Stanislav Ba...