<--- Back to Details
First PageDocument Content
Economics / Applied psychology / Behavioral economics / Behavioral finance / Microeconomics / Cognitive psychology / Psychology / Information systems / System / Science / Behavior / Behavioural sciences
Date: 2011-02-09 22:53:57
Economics
Applied psychology
Behavioral economics
Behavioral finance
Microeconomics
Cognitive psychology
Psychology
Information systems
System
Science
Behavior
Behavioural sciences

The Hong Kong University of Science and Technology

Add to Reading List

Source URL: www.bm.ust.hk

Download Document from Source Website

File Size: 52,18 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Location map Eichenweg 1, Zollikofen Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

DocID: 1xVJL - View Document

Computer law / Artificial intelligence / Trevor Bench-Capon / JURIX / Applications of artificial intelligence to legal informatics / Leon van der Torre / Ambient intelligence / Computer science

LEGAL KNOWLEDGE AND INFORMATION SYSTEMS Frontiers in Artificial Intelligence and Applications The book series Frontiers in Artificial Intelligence and Applications (FAIA) covers all aspects of theoretical and applied A

DocID: 1xVqW - View Document

Information theory / Statistical theory / Physics / Probability and statistics / Entropy / Conditional entropy / Principle of maximum entropy

LECTURE 2 Information theory for complex systems Stefan Thurner www.complex-systems.meduniwien.ac.at

DocID: 1xVpK - View Document

Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

DocID: 1xVbf - View Document