Sciweavers

3508 search results - page 76 / 702
» Zero-Error Information Theory
Sort
View
COLING
2010
14 years 4 months ago
Expressing OWL axioms by English sentences: dubious in theory, feasible in practice
With OWL (Web Ontology Language) established as a standard for encoding ontologies on the Semantic Web, interest has begun to focus on the task of verbalising OWL code in controll...
Richard Power, Allan Third
ECIS
2003
14 years 11 months ago
Positivist single case study research in information systems: a critical analysis
Positivist, single case study is an important research approach within the information systems discipline. This paper provides detailed definitions of key concepts in positivist, ...
Graeme G. Shanks, Anne N. Parr
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
HICSS
1999
IEEE
139views Biometrics» more  HICSS 1999»
15 years 2 months ago
Five Degrees of Separation: A Human Capital Model of Employment-Related Decisionmaking in the Information Technology Workforce
Successful implementation of information technology (IT)-enabled strategy rests on the performance of IT professionals. Consequently, the development and retention of this "I...
Robert A. Josefek Jr., Robert J. Kauffman
ESORICS
2006
Springer
15 years 1 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...