Sciweavers

6696 search results - page 140 / 1340
» Securing social networks
Sort
View
DATASCIENCE
2002
69views more  DATASCIENCE 2002»
13 years 10 months ago
China's Natural Resources Database (CNRD)
China's Natural Resources Database (CNRD) is a comprehensive database, developed to support the research on natural resources, social sustainable development and environmenta...
Zehui Li
CCS
2009
ACM
14 years 11 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
WIMOB
2008
IEEE
14 years 4 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
AIRWEB
2007
Springer
14 years 4 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
WWW
2003
ACM
14 years 11 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...