Sciweavers

1708 search results - page 83 / 342
» Associative personal information management
Sort
View
WPES
2003
ACM
14 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ECLIPSE
2005
ACM
13 years 11 months ago
Bridging the gap between technical and social dependencies with Ariadne
One of the reasons why large-scale software development is difficult is the number of dependencies that software engineers need to face: e.g., dependencies among the software comp...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 8 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
DEXA
2007
Springer
132views Database» more  DEXA 2007»
14 years 3 months ago
Exploring Knowledge Management with a Social Semantic Desktop Architecture
The motivation of this paper is to research the individual and the team levels of knowledge management, in order to unveil prominent knowledge needs, interactions and processes, an...
Niki Papailiou, Dimitris Apostolou, Dimitris Panag...
GVD
2000
131views Database» more  GVD 2000»
13 years 11 months ago
Adaptive Knowledge Management: A Meta-Modeling Approach and its Binding to XML
In this paper we propose a meta-modeling approach to adaptive knowledge management. It extends previous work by introducing an application-specific layer which allows to specify m...
Christian Süß