Sciweavers

21 search results - page 2 / 5
» Improving graph-walk-based similarity with reranking: Case s...
Sort
View
JTAER
2006
100views more  JTAER 2006»
13 years 7 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
ICONIP
2009
13 years 5 months ago
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites
In this paper, we present an approach that aims to study users' past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users requir...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
DEXAW
2008
IEEE
243views Database» more  DEXAW 2008»
14 years 1 months ago
Elastic Lists for Facet Browsing and Resource Analysis in the Enterprise
Information management and content governance in large corporations is an ongoing challenge. As a case study, we present the adaptation of the elastic lists facet browser for brow...
Moritz Stefaner, Thomas Urban, Marc Seefelder
GIS
2005
ACM
14 years 8 months ago
Shapes based trajectory queries for moving objects
An interesting issue in moving objects databases is to find similar trajectories of moving objects. Previous work on this topic focuses on movement patterns (trajectories with tim...
Bin Lin, Jianwen Su
SOPR
1998
117views more  SOPR 1998»
13 years 7 months ago
Towards mature IT services
Many organizations provide information technology services, either to external or internal customers. They maintain software, operate information systems, manage and maintain work...
Frank Niessink, Hans van Vliet