Sciweavers

180 search results - page 26 / 36
» Personal information management (PIM) 2008
Sort
View
COMAD
2009
13 years 8 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
IJLT
2008
184views more  IJLT 2008»
13 years 7 months ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...
WWW
2008
ACM
14 years 8 months ago
A unified framework for name disambiguation
Name ambiguity problem has been a challenging issue for a long history. In this paper, we intend to make a thorough investigation of the whole problem. Specifically, we formalize ...
Jie Tang, Jing Zhang, Duo Zhang, Juanzi Li
IEEEARES
2008
IEEE
14 years 1 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
FPLAY
2008
13 years 9 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle