Sciweavers

6137 search results - page 141 / 1228
» Securing Collaborative Applications
Sort
View
CSCW
2002
ACM
13 years 8 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager
EUROMICRO
2004
IEEE
14 years 23 days ago
The Need for Declarative Security Mechanisms
Today, security is recognized as an absolute need in application development. Programming environments offer mechanisms and concepts allowing an easy integration of security mecha...
Stefan Probst, Josef Küng
RECSYS
2009
ACM
14 years 3 months ago
Rating aggregation in collaborative filtering systems
Recommender systems based on user feedback rank items by aggregating users’ ratings in order to select those that are ranked highest. Ratings are usually aggregated using a weig...
Florent Garcin, Boi Faltings, Radu Jurca, Nadine J...
ISI
2005
Springer
14 years 2 months ago
Map-Mediated GeoCollaborative Crisis Management
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisi...
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mich...
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
13 years 7 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...