Sciweavers

1139 search results - page 205 / 228
» Trust Management Survey
Sort
View
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 8 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
DSS
2007
106views more  DSS 2007»
13 years 8 months ago
An investigation of factors that influence the duration of IT outsourcing relationships
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of researc...
Jahyun Goo, Rajiv Kishore, Kichan Nam, H. Raghav R...
JODL
2006
136views more  JODL 2006»
13 years 7 months ago
An experimental effectiveness comparison of methods for 3D similarity search
Methods for content-based similarity search are fundamental for managing large multimedia repositories, as they make it possible to conduct queries for similar content, and to orga...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
CORR
2002
Springer
105views Education» more  CORR 2002»
13 years 7 months ago
Petabyte Scale Data Mining: Dream or Reality?
Science is becoming very data intensive1 . Today's astronomy datasets with tens of millions of galaxies already present substantial challenges for data mining. In less than 1...
Alexander S. Szalay, Jim Gray, Jan vandenBerg
FUIN
2000
109views more  FUIN 2000»
13 years 7 months ago
Building Knowledge Scouts Using KGL Metalanguage
Knowledge scouts are software agents that autonomously search for and synthesize user-oriented knowledge (target knowledge) in large local or distributed databases. A knowledge ge...
Ryszard S. Michalski, Kenneth A. Kaufman