Gathering information 2: methods of assessment
نویسندگان
چکیده
منابع مشابه
Information Gathering by a Principal Information Gathering by a Principal
Working papers of the Federal Reserve Bank of Cleveland are preliminary materials circulated to stimulate discussion and critical comment on research in progress. They may not have been subject to the formal editorial review accorded official Federal Reserve Bank of Cleveland publications. The views stated herein are those of the authors and are not necessarily those of the Federal Reserve Bank...
متن کاملValue-Driven Information Gathering
We describe a decision-theoretic approach to information gathering from a distributed network of information sources. Our approach uses an explicit representation of the user’s decision model in order to plan and execute information gathering actions. The information gathering planner issues requests based on the value of information taking into account the computational resources and monetary ...
متن کاملCollaborative Information Gathering
The combination of push and pull information retrieval technology can benefit from collaborative information gathering schemes. In this paper we outline an approach that combines a pull technology (Knowledge Brokers) with a push technology (Knowledge Pump) in a community-based environment. Appropriate toolkits supporting synchronous collaboration on the World Wide Web are briefly introduced. A ...
متن کاملExecuting Information - Gathering Plans
We describe Razor, a planning-based information-gathering agent that assists users by automatically determining which Internet information sites are relevant to their query, accessing those sites in parallel, and integrating the results. Razor uses a disjunctive graphbased plan representation. It then uses a novel and powerful form of local completeness reasoning in order to transform those pla...
متن کاملInformation Gathering Using Google
Google is a powerful search engine. However, by combining Google features and creativity in construction query, it will return sensitive information that usually would not be found by casual users. Attacker could use Google to look for vulnerable targets and passively gather information about their targets to assist further attacks. This paper discusses ways to exploit Google to obtain valuable...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: British Dental Journal
سال: 2001
ISSN: 0007-0610,1476-5373
DOI: 10.1038/sj.bdj.4801079