Sciweavers

425 search results - page 74 / 85
» Creating Shared Knowledge: Instructional Knowledge Managemen...
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
IRI
2005
IEEE
14 years 1 months ago
Data-knowledge-context: an application model for collaborative work
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...
Lee A. Iverson
OHS
2001
Springer
14 years 2 days ago
Revisiting and Versioning in Virtual Special Reports
Adaptation/personalization is one of the main issues for web applications and require large repositories. Creating adaptive web applications from these repositories requires to hav...
Sébastien Iksal, Serge Garlatti
IHI
2010
186views Healthcare» more  IHI 2010»
13 years 2 months ago
Analysis of an online health social network
With the continued advances of Web 2.0, health-centered Online Social Networks (OSNs) are emerging to provide knowledge and support for those interested in managing their own heal...
Xiaoxiao Ma, Guanling Chen, Juntao Xiao
ATAL
2003
Springer
14 years 26 days ago
Searching social networks
A referral system is a multiagent system whose member agents are capable of giving and following referrals. The specific cases of interest arise where each agent has a user. The ...
Bin Yu, Munindar P. Singh