Sciweavers

99 search results - page 17 / 20
» Ordered Semantic Hyper Linking
Sort
View
SOUPS
2006
ACM
14 years 1 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
BIS
2007
183views Business» more  BIS 2007»
13 years 9 months ago
A Conceptual Framework for Composition in Business Process Management
In this work, we present a conceptual framework for deriving executable business process models from high-level, graphical business process models based on the paradigm of Service-...
Ingo Weber, Ivan Markovic, Christian Drumm
ISI
2008
Springer
13 years 7 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
13 years 11 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
URBAN
2008
83views more  URBAN 2008»
13 years 7 months ago
Automatic identification of urban settlement boundaries for multiple representation databases
Intuitive and meaningful interpretation of geographical phenomena requires their representation at multiple levels of detail. This is due to the scale dependent nature of their pr...
Omair Chaudhry, William A. Mackaness