Sciweavers

390 search results - page 53 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
WWW
2009
ACM
14 years 8 months ago
The effects of source credibility ratings in a cultural heritage information aggregator
State of the art web search applications allow the user to aggregate information from many sources. Because of this, users are confronted with having to assess the reliability of ...
Alia Amin, Junte Zhang, Henriette S. M. Cramer, Ly...
WWW
2005
ACM
14 years 8 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
WWW
2005
ACM
14 years 1 months ago
Automated synthesis of executable web service compositions from BPEL4WS processes
We propose a technique for the automated synthesis of new comeb services. Given a set of abstract BPEL4WS descriptions of component services, and a composition requirement, we aut...
Marco Pistore, Paolo Traverso, Piergiorgio Bertoli...
IV
1999
IEEE
198views Visualization» more  IV 1999»
13 years 12 months ago
A Prototype Hotel Browsing System Using Java3D
Java3D is an application-centred approach to building 3D worlds. We use Java3D and VRML to design a prototype WWW-based 3D Hotel Browsing system. A Java3D scene graph viewer was i...
D. Ball, Majid Mirmehdi
ECTEL
2006
Springer
13 years 11 months ago
Evaluation of Virtual Learning Environments Using Logs and Social Networks
The paper presents an evaluation method for e-learning platforms, based on different types of measurements collected in logs of interactions during learning sessions, and on the an...
Vlad Posea, Dan Mihaila, Stefan Trausan-Matu, Vale...