Sciweavers

519 search results - page 55 / 104
» Enhancing information systems security in an academic organi...
Sort
View
ISW
2009
Springer
14 years 2 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
JSAC
2006
181views more  JSAC 2006»
13 years 8 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
RECSYS
2010
ACM
13 years 8 months ago
Workshop on user-centric evaluation of recommender systems and their interfaces
In this paper, we aim to analyse the current level of usability on ten popular online websites utilising some kind of reputation system. The conducted heuristic and expert evaluat...
Bart P. Knijnenburg, Lars Schmidt-Thieme, Dirk G. ...
OHS
2001
Springer
14 years 16 days ago
Integrating User Data and Collaborative Filtering in a Web Recommendation System
Web-based applications with a large variety of users suffer from the inability to satisfy heterogeneous needs. A remedy for the negative effects of the traditional "one-size-...
Paolo Buono, Maria Francesca Costabile, Stefano Gu...
NAR
2007
122views more  NAR 2007»
13 years 7 months ago
The Online Bioinformatics Resources Collection at the University of Pittsburgh Health Sciences Library System - a one-stop gatew
To bridge the gap between the rising information needs of biological and medical researchers and the rapidly growing number of online bioinformatics resources, we have created the...
Yi-Bu Chen, Ansuman Chattopadhyay, Phillip Bergen,...