Sciweavers

2351 search results - page 215 / 471
» Tagging Human Knowledge
Sort
View
CHIMIT
2007
ACM
15 years 8 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
154
Voted
CW
2005
IEEE
15 years 6 months ago
Semantic Memory for Avatars in Cyberspace
Avatars that show intelligent behavior should have an access to general knowledge about the world, knowledge that humans store in their semantic memories. The simplest knowledge r...
Julian Szymanski, Tomasz Sarnatowicz, Wlodzislaw D...
IFIP3
2004
99views Education» more  IFIP3 2004»
15 years 5 months ago
Eight significant events in the 50 year history of computing
: The history of computing is relatively short compared with that of any other area of human knowledge, be it science, engineering, medicine, law, or accounting. On the other hand,...
T. William Olle
SPIESR
2001
160views Database» more  SPIESR 2001»
15 years 5 months ago
New frontiers for intelligent content-based retrieval
In this paper, we examine emerging frontiers in the evolution of content-based retrieval systems that rely on an intelligent infrastructure. Here, we refer to intelligence as the ...
Ana B. Benitez, John R. Smith
CHI
2010
ACM
15 years 11 months ago
FeedWinnower: layering structures over collections of information streams
Information overload is a growing threat to the productivity of today’s knowledge workers, who need to keep track of multiple streams of information from various sources. RSS fe...
Lichan Hong, Gregorio Convertino, Bongwon Suh, Ed ...