Sciweavers

556 search results - page 90 / 112
» Link Privacy in Social Networks
Sort
View
BPM
2009
Springer
148views Business» more  BPM 2009»
14 years 3 months ago
A Collaboration and Productiveness Analysis of the BPM Community
The main scientific event for academics working in the field of Business Process Management is the International BPM Conference. In this paper, social network analysis techniques...
Hajo A. Reijers, Minseok Song, Heidi Romero, Umesh...
CTW
2008
92views more  CTW 2008»
13 years 7 months ago
WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
CHIMIT
2007
ACM
14 years 22 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
BCB
2010
213views Bioinformatics» more  BCB 2010»
13 years 3 months ago
Markov clustering of protein interaction networks with improved balance and scalability
Markov Clustering (MCL) is a popular algorithm for clustering networks in bioinformatics such as protein-protein interaction networks and protein similarity networks. An important...
Venu Satuluri, Srinivasan Parthasarathy, Duygu Uca...
ICALT
2008
IEEE
14 years 3 months ago
Moving Towards Life-Long User Modeling
User Modeling is the core component for the majority of personalization services. It has become an important factor in the effort to personalise a diversity of web resources accor...
Demetris Kyriacou, Hugh C. Davis