Sciweavers

1893 search results - page 287 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
WISE
2002
Springer
14 years 1 months ago
Taxonomies in Operation, Design, and Meta-Design
Taxonomies are a well-established instrument for organizing and accessing resources in Information, Content and Knowledge Management (ICKM) systems. Furthermore, they contribute t...
Claudia Niederée, Claudio Muscogiuri, Matth...
PCI
2001
Springer
14 years 18 days ago
SEISMO-SURFER: A Prototype for Collecting, Querying, and Mining Seismic Data
Earthquake phenomena constitute a rich source of information over the years. Typically, the frequency of earthquakes worldwide is one every second. Collecting and querying seismic ...
Yannis Theodoridis
ACSAC
2001
IEEE
13 years 11 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 6 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
EUROPKI
2009
Springer
13 years 6 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith