Sciweavers

300 search results - page 12 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
PAKDD
2010
ACM
146views Data Mining» more  PAKDD 2010»
14 years 1 months ago
Mining Antagonistic Communities from Social Networks
During social interactions in a community, there are often sub-communities that behave in opposite manner. These antagonistic sub-communities could represent groups of people with ...
Kuan Zhang, David Lo, Ee-Peng Lim
WORDS
2003
IEEE
14 years 1 months ago
Security and Middleware
The security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either simple and limited or complex and difficult to use. In both cases are the ...
Anders Andersen, Gordon S. Blair, Per Harald Myrva...
FLAIRS
2001
13 years 10 months ago
Facilitating the Exchange of Explicit Knowledge through Ontology Mappings
In this paper, we give an overview of a system (CAIMAN) that can facilitate the exchange of relevant documents between geographically dispersed people in Communities of Interest. ...
Martin S. Lacher, Georg Groh
GRID
2006
Springer
13 years 8 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
CAD
2000
Springer
13 years 8 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat