Sciweavers

1512 search results - page 104 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
RECSYS
2010
ACM
15 years 4 months ago
Workshop on user-centric evaluation of recommender systems and their interfaces
In this paper, we aim to analyse the current level of usability on ten popular online websites utilising some kind of reputation system. The conducted heuristic and expert evaluat...
Bart P. Knijnenburg, Lars Schmidt-Thieme, Dirk G. ...
CCS
2008
ACM
15 years 6 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
ICAIL
2007
ACM
15 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ECEH
2006
93views Healthcare» more  ECEH 2006»
15 years 5 months ago
The European eHealth Initiative - Objectives and Solutions
: eHealth applications are a key factor of success for national health systems. Background, objectives, definitions and an application taxonomy are presented. After this the paper ...
Peter Haas, J. Sembritzki
ESAW
2006
Springer
15 years 8 months ago
A Definition of Exceptions in Agent-Oriented Computing
The research on exception handling in Multi-Agent Systems has produced some advanced models to deal with `exceptional situations'. The expression `agent exception' is how...
Eric Platon, Nicolas Sabouret, Shinichi Honiden