Sciweavers

6137 search results - page 97 / 1228
» Securing Collaborative Applications
Sort
View
KDD
2005
ACM
169views Data Mining» more  KDD 2005»
14 years 9 months ago
Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems ...
Bamshad Mobasher, Robin D. Burke, Chad Williams, R...
ICCS
2007
Springer
14 years 3 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
EGC
2005
Springer
14 years 2 months ago
Workflow-Oriented Collaborative Grid Portals
The paper presents how workflow-oriented, single-user Grid portals could be extended to meet the requirements of users with collaborative needs. Through collaborative Grid portals ...
Gergely Sipos, Gareth J. Lewis, Péter Kacsu...
ICSM
2002
IEEE
14 years 1 months ago
Using Dynamic Information for the Iterative Recovery of Collaborations and Roles
Modeling object-oriented applications using collaborations and roles is now well accepted. Collaboration-based or role-based designs decompose an application into tasks performed ...
Tamar Richner, Stéphane Ducasse
WEBNET
2001
13 years 10 months ago
Designing a Collaboration Environment for Teleworkers
: Teleworking enables a more flexible scheduling of working time and places of work on the way to the modern information society. The rapid development of cooperative application s...
Iris Braun, Ulf Zschuckelt