Sciweavers

1001 search results - page 126 / 201
» An Automatic System for Collecting Crime Information on the ...
Sort
View
BPM
2008
Springer
109views Business» more  BPM 2008»
13 years 10 months ago
Automating Knowledge Transfer and Creation in Knowledge Intensive Business Processes
It is a well known fact that a wealth of knowledge relies in the employees which makes them one of the most or even the most valuable asset of organisations. But often this knowled...
Michael Granitzer, Gisela Granitzer, Klaus Tochter...
WWW
2006
ACM
14 years 9 months ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
USITS
1997
13 years 10 months ago
SPAND: Shared Passive Network Performance Discovery
In the Internet today, users and applications must often make decisions based on the performance they expect to receive from other Internet hosts. For example, users can often vie...
Srinivasan Seshan, Mark Stemm, Randy H. Katz
ICDM
2003
IEEE
142views Data Mining» more  ICDM 2003»
14 years 2 months ago
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
Collaborative Filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. E-commerce sites use CF systems to suggest products to customers base...
Huseyin Polat, Wenliang Du
CIKM
1994
Springer
14 years 26 days ago
Analytical Version Control Management in a Hypertext System
may be saved for later reuse of material, but also to preserve the historical perspective of work done [ha:92]. In particular, in distributed and collaborative hypertext systems, v...
Antonina Dattolo, Antonio Gisolfi