Sciweavers

300 search results - page 23 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
SAC
2010
ACM
14 years 3 months ago
Hypothesis generation and ranking based on event similarities
Accelerated by the technological advances in the domain, the size of the biomedical literature has been growing rapidly. As a result, it is not feasible for individual researchers...
Taiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara
TES
2001
Springer
14 years 1 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
AAAI
1998
13 years 10 months ago
Recommendation as Classification: Using Social and Content-Based Information in Recommendation
Recommendationsystems makesuggestions about artifacts to a user. For instance, they maypredict whether a user wouldbe interested in seeing a particular movie. Social recomendation...
Chumki Basu, Haym Hirsh, William W. Cohen
IEEEARES
2007
IEEE
14 years 2 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 8 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone