Higher educational institutions are just like companies forced to adapt to the ever faster changing environment. There are several obstacles in the way of introducing e-learning i...
Jaka Linic, Jurij Jaklic, Mojca Indihar Stemberger
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
We describe ThinkFree, an industrial Visual Wiki application which provides a way for end users to better explore knowledge of IT Enterprise Architecture assets that is held withi...
Christian Hirsch, John G. Hosking, John C. Grundy,...
Recommendation systems are becoming increasingly popular in various large-scale web-based applications (such as infomediaries, emarketplaces, knowledge portals) since they enable u...
: Service-Oriented Architectures (SOAs) have been established as an IT strategy to support the on demand goal of business agility. Web services standards and their implementations ...