Sciweavers

270 search results - page 46 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
AGENTS
1998
Springer
13 years 11 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
GROUP
2007
ACM
13 years 11 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
WEBDB
2000
Springer
110views Database» more  WEBDB 2000»
13 years 11 months ago
Modeling Data Entry and Operations in WebML
Web Modeling Language (WebML, http://webml.org) is a notation for visually specifying complex Web sites at the conceptual level. All the concepts of WebML are specified both graph...
Aldo Bongio, Stefano Ceri, Piero Fraternali, Andre...
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Content personalization and adaptation for three-screen services
Three-screen services provide the right solution for consumers to access rich multimedia resources by any device, anytime and anywhere. In this paper, we describe a prototype syst...
Zhu Liu, David C. Gibbon, Harris Drucker, Andrea B...
DMDW
2003
134views Management» more  DMDW 2003»
13 years 9 months ago
Using Design Guidelines to Improve Data Warehouse Logical Design
Data Warehouse-(DW) logical design often start with a conceptual schema and then generates relational structures. Applying this approach implies to cope with two main aspects: (i) ...
Verónika Peralta, Raul Ruggia