Sciweavers

300 search results - page 17 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
13 years 9 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
APWEB
2006
Springer
14 years 11 days ago
Adaptive User Profile Model and Collaborative Filtering for Personalized News
Abstract. In recent years, personalized news recommendation has received increasing attention in IR community. The core problem of personalized recommendation is to model and track...
Jue Wang, Zhiwei Li, Jinyi Yao, Zengqi Sun, Mingji...
WEBI
2004
Springer
14 years 1 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
GI
2004
Springer
14 years 2 months ago
A Behavioural Approach for the Coordination of Open Source Software Intermediaries
: An interesting phenomenon in the open source software (OSS) market is the evolution of intermediaries, which provide services to the OSS community. A problem of this business mod...
Heinz Lothar Grob, Frank Bensberg, Firoz Kaderali
ICICS
2007
Springer
14 years 2 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak