Sciweavers

312 search results - page 15 / 63
» Implementing KM in an Information Technology Environment: a ...
Sort
View
CCS
2010
ACM
14 years 2 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
CAI
2011
Springer
13 years 2 months ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
ICWL
2007
Springer
14 years 1 months ago
Discovery of Educational Objective on E-Learning Resource: A Competency Approach
It is indeed important to implement e-Learning platforms for education and training purposes in a variety of domains. However, facing the enormous amount of learning resources, gui...
Shi-Ming Huang, Hsiang-Yuan Hsueh, Jing-Shiuan Hua
WWW
2006
ACM
14 years 8 months ago
GIO: a semantic web application using the information grid framework
It is well understood that the key for successful Semantic Web applications depends on the availability of machine understandable meta-data. We describe the Information Grid, a pr...
Omar Alonso, Sandeepan Banerjee, Mark Drake
ESOP
2008
Springer
13 years 9 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...