Sciweavers

6137 search results - page 143 / 1228
» Securing Collaborative Applications
Sort
View
AIR
2004
98views more  AIR 2004»
13 years 9 months ago
Further Experiments on Collaborative Ranking in Community-Based Web Search
As the search engine arms-race continues, search engines are constantly looking for ways to improve the manner in which they respond to user queries. Given the vagueness of Web sea...
Jill Freyne, Barry Smyth, Maurice Coyle, Evelyn Ba...
FAST
2009
13 years 6 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
ENTCS
2007
112views more  ENTCS 2007»
13 years 9 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
CHI
2009
ACM
14 years 9 months ago
Design and adoption of social collaboration software within businesses
Social networking and collaboration sites are having a large impact on people's personal lives. These same applications, similar functions and related experiences are being a...
Jason Blackwell, John Sheridan, Keith Instone, Dav...
IWCMC
2009
ACM
14 years 3 months ago
Performance analysis and adaptive power control for block coded collaborative networks
We derive theoretical bit and frame error rate expressions for decode-and-forward (DF) collaborative networks containing M users, employing a variety of block codes over a Rayleig...
W. Guo, Ioannis Chatzigeorgiou, Ian J. Wassell, Ro...