Sciweavers

6137 search results - page 107 / 1228
» Securing Collaborative Applications
Sort
View
RECSYS
2010
ACM
13 years 9 months ago
Incremental collaborative filtering via evolutionary co-clustering
Collaborative filtering is a popular approach for building recommender systems. Current collaborative filtering algorithms are accurate but also computationally expensive, and so ...
Mohammad Khoshneshin, W. Nick Street
JUCS
2008
109views more  JUCS 2008»
13 years 9 months ago
Seamless Transition between Connected and Disconnected Collaborative Interaction
Abstract: Nowadays, more and more users make use of web-based collaborative systems. Users participate in communities or search for and provide information in webbased systems. The...
Stephan Lukosch
FTDCS
1999
IEEE
14 years 1 months ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
14 years 3 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
CCS
2010
ACM
13 years 9 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster