Search

Showing total 5,436 results

Search Constraints

Start Over You searched for: Topic information systems applications (incl.internet) Remove constraint Topic: information systems applications (incl.internet) Topic computers and society Remove constraint Topic: computers and society Publisher springer nature Remove constraint Publisher: springer nature
5,436 results

Search Results

1. Augmented Paper: Developing Relationships Between Digital Content and Paper.

2. Efficient Wet Paper Codes.

3. Barrier to Transition from Paper-Based to Computer-Based Patient Record: Analysis of Paper-Based Patient Records.

4. Data Integration Hub for a Hybrid Paper Search.

5. Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper).

6. Augmented Classroom: A Paper-Centric Approach for Collaborative Learning System.

7. Evaluating a Simulated Student Using Real Students Data for Training and Testing$^{\thanks{The research presented in this paper is supported by National Science Foundation Award No. REC-0537198.}}$.

8. PaperCP: Exploring the Integration of Physical and Digital Affordances for Active Learning.

9. Overview of Awarded Papers - The 20th Annual Conference of JSAI.

10. Modeling User's Opinion Relevance to Recommending Research Papers.

11. Practical Security Analysis of Dirty Paper Trellis Watermarking.

12. "Merolyn the Phone": A Study of Bluetooth Naming Practices (Nominated for the Best Paper Award).

13. Discovering User Profiles from Semantically Indexed Scientific Papers.

14. Visual Tagging Through Social Collaboration: A Concept Paper.

15. Measuring Performance in the Retail Industry (Position Paper).

16. Overview of Awarded Papers: The 19th Annual Conference of JSAI.

17. Conduct, Performance, and Dilemmas of Inter-organizational Virtual Organizing.

18. Application and Analysis of Interpersonal Networks for a Community Support System.

19. Award-Winning Papers (Overview).

20. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award).

21. The Tension Between Expectations of Availability and the Reality of Availability in Hybrid Teams.

22. Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.

23. Interactive Virtual Oriental Brush with Pen-Tablet System.

24. Exploration of Researchers' Social Network for Discovering Communities.

25. ExpertiseNet: Relational and Evolutionary Expert Modeling.

26. Practical Environment for Realizing Augmented Classroom with Wireless Digital Pens.

27. A Programming Model for the Automatic Construction of USN Applications Based on Nano-Qplus.

28. Role-Based Modelling of Interactions in Database Applications.

29. Task Assignment on Parallel QoS Systems.

30. A Survey of UML Models to XML Schemas Transformations.

31. Modeling Asymmetric Slot Allocation for Mobile Multimedia Services in Microcell TDD Employing FDD Uplink as Macrocell.

32. Intelligent Agents and Their Applications.

33. Meta-search Based Web Resource Discovery for Object-Level Vertical Search.

34. Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology.

35. Characterizing Truthful Market Design.

36. Monotone Properties of Randomized Symmetric Incentive Compatible Auctions.

37. An Adaptive Sponsored Search Mechanism δ-Gain Truthful in Valuation, Time, and Budget.

38. Informed Recognition in Software Watermarking.

39. Integrating RFID Services and Ubiquitous Smart Systems for Enabling Organizations to Automatically Monitor, Decide, and Take Actions.

40. A Neural-Based Approach to Facial Expression Mapping Between Human and Robot.

41. An Association Method Using Concept-Base.

42. Real-Time Vision Based Gesture Recognition for Human-Robot Interaction.

43. Research on WebGIS Based on Multi-agent.

44. Managing Process Variants as an Information Resource.

45. An ID-Based Watermarking Scheme for Java Programs.

46. A Bayesian Approach to Emotion Detection in Dialogist's Voice for Human Robot Interaction.

47. Context-Based Approach for Human Gesture Analysis.

48. Acceptance of Voting Technology: Between Confidence and Trust.

49. Risk Mining - Overview.

50. Exploiting Security Holes in Lattice Data Hiding.