Sciweavers

718 search results - page 51 / 144
» On Defaults in Action Theories
Sort
View
LOGCOM
2002
142views more  LOGCOM 2002»
14 years 9 months ago
Two Logical Theories of Plan Recognition
We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
Wayne Wobcke
ESORICS
2010
Springer
14 years 11 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
15 years 4 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
ECIS
2001
14 years 11 months ago
Structuration Theory and Information System Development - Frameworks for Practice
Giddens' structuration theory (ST) offers an account of social life in terms of social practices developing and changing over time and space, which makes no attempt to direct...
Jeremy Rose, Rens Scheepers
HICSS
2010
IEEE
164views Biometrics» more  HICSS 2010»
15 years 4 months ago
Embodied Social Presence Theory
We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We...
Brian E. Mennecke, Janea L. Triplett, Lesya M. Has...