Sciweavers

519 search results - page 19 / 104
» Enhancing information systems security in an academic organi...
Sort
View
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
14 years 1 months ago
Increase of Potential Intellectual Bandwidth in a Scientific Community through Implementation of an End-User Information System
Qureshi, et al. (2002) [1] presented a case study where they used a framework, the Intellectual Bandwidth Model to measure an organization’s ability to create value. The model c...
Christian Bach, Salvatore Belardo, Jing Zhang
SOSP
2005
ACM
14 years 4 months ago
Connections: using context to enhance file search
Connections is a file system search tool that combines traditional content-based search with context information gathered from user activity. By tracing file system calls, Conne...
Craig A. N. Soules, Gregory R. Ganger
DATAMINE
1999
140views more  DATAMINE 1999»
13 years 7 months ago
A Scalable Parallel Algorithm for Self-Organizing Maps with Applications to Sparse Data Mining Problems
Abstract. We describe a scalable parallel implementation of the self organizing map (SOM) suitable for datamining applications involving clustering or segmentation against large da...
Richard D. Lawrence, George S. Almasi, Holly E. Ru...
ACSAC
1998
IEEE
14 years 8 days ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 8 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone