Sciweavers

15379 search results - page 387 / 3076
» Protecting users from
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
ERCIMDL
2006
Springer
147views Education» more  ERCIMDL 2006»
15 years 7 months ago
An Enhanced Search Interface for Information Discovery from Digital Libraries
Libraries, museums, and other organizations make their electronic contents available to a growing number of users on the Web. A large fraction of the information published is store...
Georgia Koutrika, Alkis Simitsis
ELPUB
2008
ACM
15 years 5 months ago
Keyword and metadata extraction from pre-prints
In this paper we study how to provide metadata for a pre-print archive. Metadata includes, but is not limited to, title, authors, citations, and keywords, and is used to both pres...
Emma Tonkin, Henk L. Muller
EPK
2007
155views Management» more  EPK 2007»
15 years 5 months ago
From Process Models to Business Landscapes
: Today, architecture and business processes are modeled separately. The only integration in architectural diagrams is done with Petri nets in the Fundamental Modeling Concept. Sin...
Oliver Kopp, Hanna Eberle, Tobias Unger, Frank Ley...
ISIWI
2000
15 years 5 months ago
Usability Engineering Methods for the Web: Results From a Usability Study
The paper presents the results of a study on usability methods for evaluating Web sites. lt summarizes the "Heuristics for Web Communications," and reports the practical...
Ilse Maria Harms, Werner Schweibenz