Sciweavers

1708 search results - page 61 / 342
» Associative personal information management
Sort
View
CSREASAM
2003
13 years 11 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
DAWAK
2004
Springer
14 years 1 months ago
PROWL: An Efficient Frequent continuity Mining Algorithm on Event Sequences
Mining association rule in event sequences is an important data mining problem with many applications. Most of previous studies on association rules are on mining intra-transaction...
Kuo-Yu Huang, Chia-Hui Chang, Kuo-Zui Lin
RE
2006
Springer
13 years 9 months ago
Managing Terminological Interference in Goal Models with Repertory Grid
Terminological interference occurs in requirements engineering when stakeholders vary in the concepts they use to understand a problem domain, and the terms they use to describe t...
Nan Niu, Steve M. Easterbrook
IWSEC
2007
Springer
14 years 3 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
SIGUCCS
2000
ACM
14 years 1 months ago
Information Provision vs. Direct Services in User Support
Like others in the field, technology service providers in the Indiana University (IU) School of Education face many demands despite limited resources. In Education Technology Serv...
Carol Rhodes, William Goveia, Brian Sierkowski