Sciweavers

36 search results - page 4 / 8
» Use Cases for Identity Management in E-Government
Sort
View
AP2PC
2005
Springer
13 years 9 months ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
WETICE
2005
IEEE
14 years 29 days ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
KDD
2004
ACM
161views Data Mining» more  KDD 2004»
14 years 23 days ago
ANN quality diagnostic models for packaging manufacturing: an industrial data mining case study
World steel trade becomes more competitive every day and new high international quality standards and productivity levels can only be achieved by applying the latest computational...
Nicolás de Abajo, Alberto B. Diez, Vanesa L...
CDVE
2004
Springer
109views Visualization» more  CDVE 2004»
14 years 24 days ago
Interest Management for Collaborative Environments Through Dividing Their Shared State
Not all participants in a collaborative virtual environment (CVE) need to be informed of every other participant’s activities. The technique used for filtering irrelevant message...
Michal Masa, Jiri Zara
DOLAP
2010
ACM
13 years 4 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero