Sciweavers

1213 search results - page 195 / 243
» Social Networks and Social Information Filtering on Digg
Sort
View
AEI
2007
119views more  AEI 2007»
13 years 9 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
CLEIEJ
2008
88views more  CLEIEJ 2008»
13 years 9 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 8 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
IJMMS
2008
99views more  IJMMS 2008»
13 years 8 months ago
Storied spaces: Cultural accounts of mobility, technology, and environmental knowing
When we think of mobility in technical terms, we think of topics such as bandwidth, resource management, location, and wireless networks. When we think of mobility in social or cu...
Johanna Brewer, Paul Dourish
AIR
2005
158views more  AIR 2005»
13 years 8 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra