Sciweavers

1022 search results - page 76 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
SIGUCCS
2000
ACM
15 years 2 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
CHI
2008
ACM
15 years 10 months ago
Evaluating motion constraints for 3D wayfinding in immersive and desktop virtual environments
Motion constraints providing guidance for 3D navigation have recently been suggested as a way of offloading some of the cognitive effort of traversing complex 3D environments on a...
Niklas Elmqvist, Mihail Eduard Tudoreanu, Philippa...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 4 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
ATAL
2009
Springer
15 years 4 months ago
Towards multi-level modeling of self-assembling intelligent micro-systems
We investigate and model the dynamics of two-dimensional stochastic self-assembly of intelligent micro-systems with minimal requirements in terms of sensing, actuation, and contro...
Grégory Mermoud, Juergen Brugger, Alcherio ...
GI
2008
Springer
14 years 11 months ago
Towards an automated detection of self-organizing behavior
Abstract: In this paper we present an entropy based method to analyze complex systems. Systems are treated as black boxes, which only expose information by some specified paramete...
Wolfgang Trumler, Mike Gerdes