نتایج جستجو برای: help seeker
تعداد نتایج: 325116 فیلتر نتایج به سال:
The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer
Recent research suggests that people obtain useful knowledge from others with whom they work closely and frequently (i.e., strong ties). Yet there has been limited empirical work examining why this is so. Moreover, other research suggests that weak ties provide useful knowledge. To help integrate these multiple findings, we propose and test a model of two-party (dyadic) knowledge exchange, with...
We present a new paradigm for multimedia information access, named the “Holistic” information access paradigm, and its underlying architecture, the 3C (Content, context, and common-background) knowledge integration architecture. The holistic information access approach is context-sensitive, concept-based, and proactive. “Context-sensitive” means that the approach incorporates the characteristic...
An open innovation strategy is increasingly being adopted by firms in order to leverage external knowledge sources to solve internal problems. However, there are challenges for firms to implement this strategy such as needing to identify, motivate, and manage external sources of innovation. Thus, innovation intermediaries such as InnoCentive are being established to assist client firms (seekers...
The rapid deployment of wireless mesh networks across universities and enterprises, and the pervasiveness of mobile devices equipped with Wi-Fi connectivity, has resulted in a scenario wherein end users have the option to choose from a multitude of access points at any given location. Moreover, with the increasing availability of rich online content, there has been a steady increase in mobile I...
High dimensional data values are processed and optimized with feature selection process. A feature selection algorithm is constructed with the consideration of efficiency and effectiveness factors. The efficiency concerns the time required to find a subset of features. The effectiveness is related to the quality of the subset of features. 3 dimensional data models are constructed with object, a...
This paper examines the shifting role of perceived value and satisfaction in the formation of loyalty over the duration of a relationship life cycle. Drawing on a sample of online shoppers in Taiwan, the results show that the association between loyalty intention and shopping experiences conforms to an S-shaped growth curve. Customers’ intentions to stay with a website appear to be influenced b...
Personalized games should provide a better player experience than one-size-fits-all games. As a method for personalization, player type models have been discussed recently. Player type models would be useful tools in the personalization of games, if they have a relationship to the players’ experience of specific game mechanics. However, this relationship has never been empirically investigated....
This paper describes Seeker, a platform for large-scale text analytics, and SemTag, an application written on the platform to perform automated semantic tagging of large corpora. We apply SemTag to a collection of approximately 264 million web pages, and generate approximately 434 million automatically disambiguated semantic tags, published to the web as a label bureau providing metadata regard...
Swarm intelligence algorithms have been succesfully applied to hard optimization problems. Seeker optimization algorithm is one of the latest members of that class of metaheuristics and it has not yet been thorougly researched. Since the early versions of this algorithm were less succesful with multimodal functions, we propose in this paper hybridization of the seeker optimization algorithm wit...
The hide-and-seek game has many interesting aspects for studying cognitive functions in robots and the interactions between mobile robots and humans. Some MOMDP (Mixed Observable Markovian Decision Processes) models and a heuristic-based method are proposed and evaluated as an automated seeker. MOMDPs are used because the hider’s position is not always known (partially observable), and the seek...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید