Sciweavers

7839 search results - page 1489 / 1568
» What's there and what's not
Sort
View
97
Voted
ISJ
2008
93views more  ISJ 2008»
15 years 23 days ago
Knowledge transfer in globally distributed teams: the role of transactive memory
Abstract. This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recentl...
Ilan Oshri, Paul C. van Fenema, Julia Kotlarsky
129
Voted
IVS
2008
145views more  IVS 2008»
15 years 23 days ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
116
Voted
JAIR
2008
104views more  JAIR 2008»
15 years 23 days ago
On the Qualitative Comparison of Decisions Having Positive and Negative Features
Making a decision is often a matter of listing and comparing positive and negative arguments. In such cases, the evaluation scale for decisions should be considered bipolar, that ...
Didier Dubois, Hélène Fargier, Jean-...
94
Voted
IJRR
2006
110views more  IJRR 2006»
15 years 23 days ago
Optimal Mass Distribution for Passivity-Based Bipedal Robots
This paper reports how and to what extent the mass distribution of a passive dynamic walker can be tuned to maximize walking speed and stability. An exploration of the complete pa...
Joachim Haß, J. Michael Herrmann, Theo Geise...
85
Voted
IJSN
2006
65views more  IJSN 2006»
15 years 23 days ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
« Prev « First page 1489 / 1568 Last » Next »