Sciweavers

3451 search results - page 610 / 691
» Collaborative attack modeling
Sort
View
KCAP
2005
ACM
14 years 1 months ago
Towards Browsing Distant Metadata Using Semantic Signatures
In this document, we describe a light-weighted ontology mediation method that allows users to send semantic queries to distant data repositories to browse for learning object meta...
Andrew Choi, Marek Hatala
BPM
2005
Springer
97views Business» more  BPM 2005»
14 years 1 months ago
Service Interaction Patterns
Abstract. With increased sophistication and standardization of modeling languages and execution platforms supporting business process management (BPM) across traditional boundaries...
Alistair P. Barros, Marlon Dumas, Arthur H. M. ter...
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
14 years 1 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann
ICCBR
2005
Springer
14 years 1 months ago
Re-using Implicit Knowledge in Short-Term Information Profiles for Context-Sensitive Tasks
Typically, case-based recommender systems recommend single items to the on-line customer. In this paper we introduce the idea of recommending a user-defined collection of items whe...
Conor Hayes, Paolo Avesani, Emiliano Baldo, Padrai...
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
14 years 1 months ago
Automatic detection of interaction groups
This paper addresses the problem of detecting interaction groups in an intelligent environment. To understand human activity, we need to identify human actors and their interperso...
Oliver Brdiczka, Jérôme Maisonnasse, ...