Sciweavers

1944 search results - page 320 / 389
» Peer-to-Peer for Collaborative Applications
Sort
View
163
Voted
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
139
Voted
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
15 years 9 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker
ITRUST
2004
Springer
15 years 9 months ago
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities
This paper presents the design of a new middleware which provides support for trust and accountability in distributed data sharing communities. One application is in the context of...
Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Re...
155
Voted
ITS
2004
Springer
155views Multimedia» more  ITS 2004»
15 years 9 months ago
Modeling the Development of Problem Solving Skills in Chemistry with a Web-Based Tutor
This research describes a probabilistic approach for developing predictive models of how students learn problem-solving skills in general qualitative chemistry. The goal is to use ...
Ron Stevens, Amy Soller, Melanie Cooper, Marcia Sp...
CISIS
2010
IEEE
15 years 9 months ago
Semantic Web Fostering Enterprise 2.0
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...